Jan 23 01:45:02 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Jan 23 01:45:02 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Jan 23 01:45:02 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Jan 23 01:45:02 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 23 01:45:02 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 23 01:45:02 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 23 01:45:02 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 23 01:45:02 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jan 23 01:45:02 localhost kernel: signal: max sigframe size: 1776 Jan 23 01:45:02 localhost kernel: BIOS-provided physical RAM map: Jan 23 01:45:02 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 23 01:45:02 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 23 01:45:02 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 23 01:45:02 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Jan 23 01:45:02 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Jan 23 01:45:02 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 23 01:45:02 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 23 01:45:02 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Jan 23 01:45:02 localhost kernel: NX (Execute Disable) protection: active Jan 23 01:45:02 localhost kernel: SMBIOS 2.8 present. Jan 23 01:45:02 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Jan 23 01:45:02 localhost kernel: Hypervisor detected: KVM Jan 23 01:45:02 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 23 01:45:02 localhost kernel: kvm-clock: using sched offset of 1837701656 cycles Jan 23 01:45:02 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 23 01:45:02 localhost kernel: tsc: Detected 2799.998 MHz processor Jan 23 01:45:02 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Jan 23 01:45:02 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 23 01:45:02 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Jan 23 01:45:02 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Jan 23 01:45:02 localhost kernel: Using GB pages for direct mapping Jan 23 01:45:02 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Jan 23 01:45:02 localhost kernel: ACPI: Early table checksum verification disabled Jan 23 01:45:02 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Jan 23 01:45:02 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:02 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:02 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:02 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Jan 23 01:45:02 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:02 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:02 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Jan 23 01:45:02 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Jan 23 01:45:02 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Jan 23 01:45:02 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Jan 23 01:45:02 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Jan 23 01:45:02 localhost kernel: No NUMA configuration found Jan 23 01:45:02 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Jan 23 01:45:02 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd5000-0x43fffffff] Jan 23 01:45:02 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Jan 23 01:45:02 localhost kernel: Zone ranges: Jan 23 01:45:02 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 23 01:45:02 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jan 23 01:45:02 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Jan 23 01:45:02 localhost kernel: Device empty Jan 23 01:45:02 localhost kernel: Movable zone start for each node Jan 23 01:45:02 localhost kernel: Early memory node ranges Jan 23 01:45:02 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 23 01:45:02 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Jan 23 01:45:02 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Jan 23 01:45:02 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Jan 23 01:45:02 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 23 01:45:02 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 23 01:45:02 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Jan 23 01:45:02 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Jan 23 01:45:02 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 23 01:45:02 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 23 01:45:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 23 01:45:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 23 01:45:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 23 01:45:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 23 01:45:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 23 01:45:02 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jan 23 01:45:02 localhost kernel: TSC deadline timer available Jan 23 01:45:02 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Jan 23 01:45:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Jan 23 01:45:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Jan 23 01:45:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Jan 23 01:45:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Jan 23 01:45:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Jan 23 01:45:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Jan 23 01:45:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Jan 23 01:45:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Jan 23 01:45:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Jan 23 01:45:02 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Jan 23 01:45:02 localhost kernel: Booting paravirtualized kernel on KVM Jan 23 01:45:02 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 23 01:45:02 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Jan 23 01:45:02 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Jan 23 01:45:02 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Jan 23 01:45:02 localhost kernel: Fallback order for Node 0: 0 Jan 23 01:45:02 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Jan 23 01:45:02 localhost kernel: Policy zone: Normal Jan 23 01:45:02 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Jan 23 01:45:02 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Jan 23 01:45:02 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Jan 23 01:45:02 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jan 23 01:45:02 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 23 01:45:02 localhost kernel: software IO TLB: area num 8. Jan 23 01:45:02 localhost kernel: Memory: 2873456K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741260K reserved, 0K cma-reserved) Jan 23 01:45:02 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Jan 23 01:45:02 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Jan 23 01:45:02 localhost kernel: ftrace: allocating 44803 entries in 176 pages Jan 23 01:45:02 localhost kernel: ftrace: allocated 176 pages with 3 groups Jan 23 01:45:02 localhost kernel: Dynamic Preempt: voluntary Jan 23 01:45:02 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Jan 23 01:45:02 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Jan 23 01:45:02 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Jan 23 01:45:02 localhost kernel: #011Rude variant of Tasks RCU enabled. Jan 23 01:45:02 localhost kernel: #011Tracing variant of Tasks RCU enabled. Jan 23 01:45:02 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 23 01:45:02 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Jan 23 01:45:02 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Jan 23 01:45:02 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jan 23 01:45:02 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Jan 23 01:45:02 localhost kernel: random: crng init done (trusting CPU's manufacturer) Jan 23 01:45:02 localhost kernel: Console: colour VGA+ 80x25 Jan 23 01:45:02 localhost kernel: printk: console [tty0] enabled Jan 23 01:45:02 localhost kernel: printk: console [ttyS0] enabled Jan 23 01:45:02 localhost kernel: ACPI: Core revision 20211217 Jan 23 01:45:02 localhost kernel: APIC: Switch to symmetric I/O mode setup Jan 23 01:45:02 localhost kernel: x2apic enabled Jan 23 01:45:02 localhost kernel: Switched APIC routing to physical x2apic. Jan 23 01:45:02 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 23 01:45:02 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Jan 23 01:45:02 localhost kernel: pid_max: default: 32768 minimum: 301 Jan 23 01:45:02 localhost kernel: LSM: Security Framework initializing Jan 23 01:45:02 localhost kernel: Yama: becoming mindful. Jan 23 01:45:02 localhost kernel: SELinux: Initializing. Jan 23 01:45:02 localhost kernel: LSM support for eBPF active Jan 23 01:45:02 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 23 01:45:02 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 23 01:45:02 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 23 01:45:02 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 23 01:45:02 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 23 01:45:02 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 23 01:45:02 localhost kernel: Spectre V2 : Mitigation: Retpolines Jan 23 01:45:02 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jan 23 01:45:02 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jan 23 01:45:02 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jan 23 01:45:02 localhost kernel: RETBleed: Mitigation: untrained return thunk Jan 23 01:45:02 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jan 23 01:45:02 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Jan 23 01:45:02 localhost kernel: Freeing SMP alternatives memory: 36K Jan 23 01:45:02 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Jan 23 01:45:02 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Jan 23 01:45:02 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Jan 23 01:45:02 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Jan 23 01:45:02 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Jan 23 01:45:02 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jan 23 01:45:02 localhost kernel: ... version: 0 Jan 23 01:45:02 localhost kernel: ... bit width: 48 Jan 23 01:45:02 localhost kernel: ... generic registers: 6 Jan 23 01:45:02 localhost kernel: ... value mask: 0000ffffffffffff Jan 23 01:45:02 localhost kernel: ... max period: 00007fffffffffff Jan 23 01:45:02 localhost kernel: ... fixed-purpose events: 0 Jan 23 01:45:02 localhost kernel: ... event mask: 000000000000003f Jan 23 01:45:02 localhost kernel: rcu: Hierarchical SRCU implementation. Jan 23 01:45:02 localhost kernel: rcu: #011Max phase no-delay instances is 400. Jan 23 01:45:02 localhost kernel: smp: Bringing up secondary CPUs ... Jan 23 01:45:02 localhost kernel: x86: Booting SMP configuration: Jan 23 01:45:02 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Jan 23 01:45:02 localhost kernel: smp: Brought up 1 node, 8 CPUs Jan 23 01:45:02 localhost kernel: smpboot: Max logical packages: 8 Jan 23 01:45:02 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Jan 23 01:45:02 localhost kernel: node 0 deferred pages initialised in 18ms Jan 23 01:45:02 localhost kernel: devtmpfs: initialized Jan 23 01:45:02 localhost kernel: x86/mm: Memory block size: 128MB Jan 23 01:45:02 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 23 01:45:02 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Jan 23 01:45:02 localhost kernel: pinctrl core: initialized pinctrl subsystem Jan 23 01:45:02 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jan 23 01:45:02 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Jan 23 01:45:02 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jan 23 01:45:02 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jan 23 01:45:02 localhost kernel: audit: initializing netlink subsys (disabled) Jan 23 01:45:02 localhost kernel: audit: type=2000 audit(1769150700.482:1): state=initialized audit_enabled=0 res=1 Jan 23 01:45:02 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Jan 23 01:45:02 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 23 01:45:02 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Jan 23 01:45:02 localhost kernel: cpuidle: using governor menu Jan 23 01:45:02 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Jan 23 01:45:02 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 23 01:45:02 localhost kernel: PCI: Using configuration type 1 for base access Jan 23 01:45:02 localhost kernel: PCI: Using configuration type 1 for extended access Jan 23 01:45:02 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jan 23 01:45:02 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Jan 23 01:45:02 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jan 23 01:45:02 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jan 23 01:45:02 localhost kernel: cryptd: max_cpu_qlen set to 1000 Jan 23 01:45:02 localhost kernel: ACPI: Added _OSI(Module Device) Jan 23 01:45:02 localhost kernel: ACPI: Added _OSI(Processor Device) Jan 23 01:45:02 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jan 23 01:45:02 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 23 01:45:02 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Jan 23 01:45:02 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jan 23 01:45:02 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jan 23 01:45:02 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 23 01:45:02 localhost kernel: ACPI: Interpreter enabled Jan 23 01:45:02 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Jan 23 01:45:02 localhost kernel: ACPI: Using IOAPIC for interrupt routing Jan 23 01:45:02 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 23 01:45:02 localhost kernel: PCI: Using E820 reservations for host bridge windows Jan 23 01:45:02 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jan 23 01:45:02 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 23 01:45:02 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Jan 23 01:45:02 localhost kernel: acpiphp: Slot [3] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [4] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [5] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [6] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [7] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [8] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [9] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [10] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [11] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [12] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [13] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [14] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [15] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [16] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [17] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [18] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [19] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [20] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [21] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [22] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [23] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [24] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [25] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [26] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [27] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [28] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [29] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [30] registered Jan 23 01:45:02 localhost kernel: acpiphp: Slot [31] registered Jan 23 01:45:02 localhost kernel: PCI host bridge to bus 0000:00 Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 23 01:45:02 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jan 23 01:45:02 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jan 23 01:45:02 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Jan 23 01:45:02 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Jan 23 01:45:02 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jan 23 01:45:02 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jan 23 01:45:02 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jan 23 01:45:02 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jan 23 01:45:02 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Jan 23 01:45:02 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Jan 23 01:45:02 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jan 23 01:45:02 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jan 23 01:45:02 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jan 23 01:45:02 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Jan 23 01:45:02 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Jan 23 01:45:02 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Jan 23 01:45:02 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Jan 23 01:45:02 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Jan 23 01:45:02 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 23 01:45:02 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jan 23 01:45:02 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Jan 23 01:45:02 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Jan 23 01:45:02 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Jan 23 01:45:02 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Jan 23 01:45:02 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jan 23 01:45:02 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jan 23 01:45:02 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Jan 23 01:45:02 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Jan 23 01:45:02 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Jan 23 01:45:02 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Jan 23 01:45:02 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Jan 23 01:45:02 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Jan 23 01:45:02 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Jan 23 01:45:02 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Jan 23 01:45:02 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jan 23 01:45:02 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jan 23 01:45:02 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jan 23 01:45:02 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jan 23 01:45:02 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jan 23 01:45:02 localhost kernel: iommu: Default domain type: Translated Jan 23 01:45:02 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jan 23 01:45:02 localhost kernel: SCSI subsystem initialized Jan 23 01:45:02 localhost kernel: ACPI: bus type USB registered Jan 23 01:45:02 localhost kernel: usbcore: registered new interface driver usbfs Jan 23 01:45:02 localhost kernel: usbcore: registered new interface driver hub Jan 23 01:45:02 localhost kernel: usbcore: registered new device driver usb Jan 23 01:45:02 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Jan 23 01:45:02 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jan 23 01:45:02 localhost kernel: PTP clock support registered Jan 23 01:45:02 localhost kernel: EDAC MC: Ver: 3.0.0 Jan 23 01:45:02 localhost kernel: NetLabel: Initializing Jan 23 01:45:02 localhost kernel: NetLabel: domain hash size = 128 Jan 23 01:45:02 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Jan 23 01:45:02 localhost kernel: NetLabel: unlabeled traffic allowed by default Jan 23 01:45:02 localhost kernel: PCI: Using ACPI for IRQ routing Jan 23 01:45:02 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jan 23 01:45:02 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jan 23 01:45:02 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 23 01:45:02 localhost kernel: vgaarb: loaded Jan 23 01:45:02 localhost kernel: clocksource: Switched to clocksource kvm-clock Jan 23 01:45:02 localhost kernel: VFS: Disk quotas dquot_6.6.0 Jan 23 01:45:02 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 23 01:45:02 localhost kernel: pnp: PnP ACPI init Jan 23 01:45:02 localhost kernel: pnp: PnP ACPI: found 5 devices Jan 23 01:45:02 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 23 01:45:02 localhost kernel: NET: Registered PF_INET protocol family Jan 23 01:45:02 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 23 01:45:02 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Jan 23 01:45:02 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jan 23 01:45:02 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jan 23 01:45:02 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jan 23 01:45:02 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Jan 23 01:45:02 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Jan 23 01:45:02 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Jan 23 01:45:02 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Jan 23 01:45:02 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jan 23 01:45:02 localhost kernel: NET: Registered PF_XDP protocol family Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Jan 23 01:45:02 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Jan 23 01:45:02 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jan 23 01:45:02 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jan 23 01:45:02 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jan 23 01:45:02 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 27218 usecs Jan 23 01:45:02 localhost kernel: PCI: CLS 0 bytes, default 64 Jan 23 01:45:02 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jan 23 01:45:02 localhost kernel: Trying to unpack rootfs image as initramfs... Jan 23 01:45:02 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Jan 23 01:45:02 localhost kernel: ACPI: bus type thunderbolt registered Jan 23 01:45:02 localhost kernel: Initialise system trusted keyrings Jan 23 01:45:02 localhost kernel: Key type blacklist registered Jan 23 01:45:02 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Jan 23 01:45:02 localhost kernel: zbud: loaded Jan 23 01:45:02 localhost kernel: integrity: Platform Keyring initialized Jan 23 01:45:02 localhost kernel: NET: Registered PF_ALG protocol family Jan 23 01:45:02 localhost kernel: xor: automatically using best checksumming function avx Jan 23 01:45:02 localhost kernel: Key type asymmetric registered Jan 23 01:45:02 localhost kernel: Asymmetric key parser 'x509' registered Jan 23 01:45:02 localhost kernel: Running certificate verification selftests Jan 23 01:45:02 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Jan 23 01:45:02 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Jan 23 01:45:02 localhost kernel: io scheduler mq-deadline registered Jan 23 01:45:02 localhost kernel: io scheduler kyber registered Jan 23 01:45:02 localhost kernel: io scheduler bfq registered Jan 23 01:45:02 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Jan 23 01:45:02 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Jan 23 01:45:02 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Jan 23 01:45:02 localhost kernel: ACPI: button: Power Button [PWRF] Jan 23 01:45:02 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jan 23 01:45:02 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jan 23 01:45:02 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jan 23 01:45:02 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 23 01:45:02 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 23 01:45:02 localhost kernel: Non-volatile memory driver v1.3 Jan 23 01:45:02 localhost kernel: rdac: device handler registered Jan 23 01:45:02 localhost kernel: hp_sw: device handler registered Jan 23 01:45:02 localhost kernel: emc: device handler registered Jan 23 01:45:02 localhost kernel: alua: device handler registered Jan 23 01:45:02 localhost kernel: libphy: Fixed MDIO Bus: probed Jan 23 01:45:02 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Jan 23 01:45:02 localhost kernel: ehci-pci: EHCI PCI platform driver Jan 23 01:45:02 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Jan 23 01:45:02 localhost kernel: ohci-pci: OHCI PCI platform driver Jan 23 01:45:02 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Jan 23 01:45:02 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Jan 23 01:45:02 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Jan 23 01:45:02 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Jan 23 01:45:02 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Jan 23 01:45:02 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Jan 23 01:45:02 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jan 23 01:45:02 localhost kernel: usb usb1: Product: UHCI Host Controller Jan 23 01:45:02 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Jan 23 01:45:02 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Jan 23 01:45:02 localhost kernel: hub 1-0:1.0: USB hub found Jan 23 01:45:02 localhost kernel: hub 1-0:1.0: 2 ports detected Jan 23 01:45:02 localhost kernel: usbcore: registered new interface driver usbserial_generic Jan 23 01:45:02 localhost kernel: usbserial: USB Serial support registered for generic Jan 23 01:45:02 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 23 01:45:02 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 23 01:45:02 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 23 01:45:02 localhost kernel: mousedev: PS/2 mouse device common for all mice Jan 23 01:45:02 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 23 01:45:02 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Jan 23 01:45:02 localhost kernel: rtc_cmos 00:04: registered as rtc0 Jan 23 01:45:02 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-01-23T06:45:01 UTC (1769150701) Jan 23 01:45:02 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Jan 23 01:45:02 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Jan 23 01:45:02 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Jan 23 01:45:02 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Jan 23 01:45:02 localhost kernel: usbcore: registered new interface driver usbhid Jan 23 01:45:02 localhost kernel: usbhid: USB HID core driver Jan 23 01:45:02 localhost kernel: drop_monitor: Initializing network drop monitor service Jan 23 01:45:02 localhost kernel: Initializing XFRM netlink socket Jan 23 01:45:02 localhost kernel: NET: Registered PF_INET6 protocol family Jan 23 01:45:02 localhost kernel: Segment Routing with IPv6 Jan 23 01:45:02 localhost kernel: NET: Registered PF_PACKET protocol family Jan 23 01:45:02 localhost kernel: mpls_gso: MPLS GSO support Jan 23 01:45:02 localhost kernel: IPI shorthand broadcast: enabled Jan 23 01:45:02 localhost kernel: AVX2 version of gcm_enc/dec engaged. Jan 23 01:45:02 localhost kernel: AES CTR mode by8 optimization enabled Jan 23 01:45:02 localhost kernel: sched_clock: Marking stable (730814671, 175913573)->(1036334230, -129605986) Jan 23 01:45:02 localhost kernel: registered taskstats version 1 Jan 23 01:45:02 localhost kernel: Loading compiled-in X.509 certificates Jan 23 01:45:02 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Jan 23 01:45:02 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Jan 23 01:45:02 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Jan 23 01:45:02 localhost kernel: zswap: loaded using pool lzo/zbud Jan 23 01:45:02 localhost kernel: page_owner is disabled Jan 23 01:45:02 localhost kernel: Key type big_key registered Jan 23 01:45:02 localhost kernel: Freeing initrd memory: 74232K Jan 23 01:45:02 localhost kernel: Key type encrypted registered Jan 23 01:45:02 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Jan 23 01:45:02 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Jan 23 01:45:02 localhost kernel: Loading compiled-in module X.509 certificates Jan 23 01:45:02 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Jan 23 01:45:02 localhost kernel: ima: Allocated hash algorithm: sha256 Jan 23 01:45:02 localhost kernel: ima: No architecture policies found Jan 23 01:45:02 localhost kernel: evm: Initialising EVM extended attributes: Jan 23 01:45:02 localhost kernel: evm: security.selinux Jan 23 01:45:02 localhost kernel: evm: security.SMACK64 (disabled) Jan 23 01:45:02 localhost kernel: evm: security.SMACK64EXEC (disabled) Jan 23 01:45:02 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Jan 23 01:45:02 localhost kernel: evm: security.SMACK64MMAP (disabled) Jan 23 01:45:02 localhost kernel: evm: security.apparmor (disabled) Jan 23 01:45:02 localhost kernel: evm: security.ima Jan 23 01:45:02 localhost kernel: evm: security.capability Jan 23 01:45:02 localhost kernel: evm: HMAC attrs: 0x1 Jan 23 01:45:02 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Jan 23 01:45:02 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Jan 23 01:45:02 localhost kernel: usb 1-1: Product: QEMU USB Tablet Jan 23 01:45:02 localhost kernel: usb 1-1: Manufacturer: QEMU Jan 23 01:45:02 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Jan 23 01:45:02 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Jan 23 01:45:02 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Jan 23 01:45:02 localhost kernel: Freeing unused decrypted memory: 2036K Jan 23 01:45:02 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Jan 23 01:45:02 localhost kernel: Write protecting the kernel read-only data: 26624k Jan 23 01:45:02 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jan 23 01:45:02 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Jan 23 01:45:02 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Jan 23 01:45:02 localhost kernel: Run /init as init process Jan 23 01:45:02 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 23 01:45:02 localhost systemd[1]: Detected virtualization kvm. Jan 23 01:45:02 localhost systemd[1]: Detected architecture x86-64. Jan 23 01:45:02 localhost systemd[1]: Running in initrd. Jan 23 01:45:02 localhost systemd[1]: No hostname configured, using default hostname. Jan 23 01:45:02 localhost systemd[1]: Hostname set to . Jan 23 01:45:02 localhost systemd[1]: Initializing machine ID from VM UUID. Jan 23 01:45:02 localhost systemd[1]: Queued start job for default target Initrd Default Target. Jan 23 01:45:02 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 23 01:45:02 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 23 01:45:02 localhost systemd[1]: Reached target Initrd /usr File System. Jan 23 01:45:02 localhost systemd[1]: Reached target Local File Systems. Jan 23 01:45:02 localhost systemd[1]: Reached target Path Units. Jan 23 01:45:02 localhost systemd[1]: Reached target Slice Units. Jan 23 01:45:02 localhost systemd[1]: Reached target Swaps. Jan 23 01:45:02 localhost systemd[1]: Reached target Timer Units. Jan 23 01:45:02 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 23 01:45:02 localhost systemd[1]: Listening on Journal Socket (/dev/log). Jan 23 01:45:02 localhost systemd[1]: Listening on Journal Socket. Jan 23 01:45:02 localhost systemd[1]: Listening on udev Control Socket. Jan 23 01:45:02 localhost systemd[1]: Listening on udev Kernel Socket. Jan 23 01:45:02 localhost systemd[1]: Reached target Socket Units. Jan 23 01:45:02 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 23 01:45:02 localhost systemd[1]: Starting Journal Service... Jan 23 01:45:02 localhost systemd[1]: Starting Load Kernel Modules... Jan 23 01:45:02 localhost systemd[1]: Starting Create System Users... Jan 23 01:45:02 localhost systemd[1]: Starting Setup Virtual Console... Jan 23 01:45:02 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 23 01:45:02 localhost systemd[1]: Finished Load Kernel Modules. Jan 23 01:45:02 localhost systemd-journald[284]: Journal started Jan 23 01:45:02 localhost systemd-journald[284]: Runtime Journal (/run/log/journal/781880a0cfe94499a7435c6f4879fd85) is 8.0M, max 314.7M, 306.7M free. Jan 23 01:45:02 localhost systemd-modules-load[285]: Module 'msr' is built in Jan 23 01:45:02 localhost systemd[1]: Started Journal Service. Jan 23 01:45:02 localhost systemd[1]: Finished Setup Virtual Console. Jan 23 01:45:02 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Jan 23 01:45:02 localhost systemd[1]: Starting dracut cmdline hook... Jan 23 01:45:02 localhost systemd[1]: Starting Apply Kernel Variables... Jan 23 01:45:02 localhost systemd-sysusers[286]: Creating group 'sgx' with GID 997. Jan 23 01:45:02 localhost systemd-sysusers[286]: Creating group 'users' with GID 100. Jan 23 01:45:02 localhost systemd-sysusers[286]: Creating group 'dbus' with GID 81. Jan 23 01:45:02 localhost systemd-sysusers[286]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Jan 23 01:45:02 localhost systemd[1]: Finished Create System Users. Jan 23 01:45:02 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 23 01:45:02 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 23 01:45:02 localhost systemd[1]: Finished Apply Kernel Variables. Jan 23 01:45:02 localhost dracut-cmdline[289]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Jan 23 01:45:02 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 23 01:45:02 localhost dracut-cmdline[289]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Jan 23 01:45:02 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 23 01:45:02 localhost systemd[1]: Finished dracut cmdline hook. Jan 23 01:45:02 localhost systemd[1]: Starting dracut pre-udev hook... Jan 23 01:45:02 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jan 23 01:45:02 localhost kernel: device-mapper: uevent: version 1.0.3 Jan 23 01:45:02 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Jan 23 01:45:02 localhost kernel: RPC: Registered named UNIX socket transport module. Jan 23 01:45:02 localhost kernel: RPC: Registered udp transport module. Jan 23 01:45:02 localhost kernel: RPC: Registered tcp transport module. Jan 23 01:45:02 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jan 23 01:45:02 localhost rpc.statd[408]: Version 2.5.4 starting Jan 23 01:45:02 localhost rpc.statd[408]: Initializing NSM state Jan 23 01:45:02 localhost rpc.idmapd[413]: Setting log level to 0 Jan 23 01:45:02 localhost systemd[1]: Finished dracut pre-udev hook. Jan 23 01:45:02 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 23 01:45:02 localhost systemd-udevd[426]: Using default interface naming scheme 'rhel-9.0'. Jan 23 01:45:02 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 23 01:45:02 localhost systemd[1]: Starting dracut pre-trigger hook... Jan 23 01:45:02 localhost systemd[1]: Finished dracut pre-trigger hook. Jan 23 01:45:02 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 23 01:45:02 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 23 01:45:02 localhost systemd[1]: Reached target System Initialization. Jan 23 01:45:02 localhost systemd[1]: Reached target Basic System. Jan 23 01:45:02 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 23 01:45:02 localhost systemd[1]: Reached target Network. Jan 23 01:45:02 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 23 01:45:02 localhost systemd[1]: Starting dracut initqueue hook... Jan 23 01:45:02 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Jan 23 01:45:02 localhost kernel: scsi host0: ata_piix Jan 23 01:45:02 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jan 23 01:45:02 localhost kernel: scsi host1: ata_piix Jan 23 01:45:02 localhost kernel: GPT:20971519 != 838860799 Jan 23 01:45:02 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Jan 23 01:45:02 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Jan 23 01:45:02 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Jan 23 01:45:02 localhost systemd-udevd[462]: Network interface NamePolicy= disabled on kernel command line. Jan 23 01:45:02 localhost kernel: GPT:20971519 != 838860799 Jan 23 01:45:02 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Jan 23 01:45:02 localhost kernel: vda: vda1 vda2 vda3 vda4 Jan 23 01:45:02 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Jan 23 01:45:03 localhost systemd[1]: Reached target Initrd Root Device. Jan 23 01:45:03 localhost kernel: ata1: found unknown device (class 0) Jan 23 01:45:03 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 23 01:45:03 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 23 01:45:03 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Jan 23 01:45:03 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 23 01:45:03 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 23 01:45:03 localhost systemd[1]: Finished dracut initqueue hook. Jan 23 01:45:03 localhost systemd[1]: Reached target Preparation for Remote File Systems. Jan 23 01:45:03 localhost systemd[1]: Reached target Remote Encrypted Volumes. Jan 23 01:45:03 localhost systemd[1]: Reached target Remote File Systems. Jan 23 01:45:03 localhost systemd[1]: Starting dracut pre-mount hook... Jan 23 01:45:03 localhost systemd[1]: Finished dracut pre-mount hook. Jan 23 01:45:03 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Jan 23 01:45:03 localhost systemd-fsck[511]: /usr/sbin/fsck.xfs: XFS file system. Jan 23 01:45:03 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Jan 23 01:45:03 localhost systemd[1]: Mounting /sysroot... Jan 23 01:45:03 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Jan 23 01:45:03 localhost kernel: XFS (vda4): Mounting V5 Filesystem Jan 23 01:45:03 localhost kernel: XFS (vda4): Ending clean mount Jan 23 01:45:03 localhost systemd[1]: Mounted /sysroot. Jan 23 01:45:03 localhost systemd[1]: Reached target Initrd Root File System. Jan 23 01:45:03 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Jan 23 01:45:03 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Jan 23 01:45:03 localhost systemd[1]: Reached target Initrd File Systems. Jan 23 01:45:03 localhost systemd[1]: Reached target Initrd Default Target. Jan 23 01:45:03 localhost systemd[1]: Starting dracut mount hook... Jan 23 01:45:03 localhost systemd[1]: Finished dracut mount hook. Jan 23 01:45:03 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 23 01:45:03 localhost rpc.idmapd[413]: exiting on signal 15 Jan 23 01:45:03 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 23 01:45:03 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 23 01:45:03 localhost systemd[1]: Stopped target Network. Jan 23 01:45:03 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Jan 23 01:45:03 localhost systemd[1]: Stopped target Timer Units. Jan 23 01:45:03 localhost systemd[1]: dbus.socket: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Jan 23 01:45:03 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 23 01:45:03 localhost systemd[1]: Stopped target Initrd Default Target. Jan 23 01:45:03 localhost systemd[1]: Stopped target Basic System. Jan 23 01:45:03 localhost systemd[1]: Stopped target Initrd Root Device. Jan 23 01:45:03 localhost systemd[1]: Stopped target Initrd /usr File System. Jan 23 01:45:03 localhost systemd[1]: Stopped target Path Units. Jan 23 01:45:03 localhost systemd[1]: Stopped target Remote File Systems. Jan 23 01:45:03 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Jan 23 01:45:03 localhost systemd[1]: Stopped target Slice Units. Jan 23 01:45:03 localhost systemd[1]: Stopped target Socket Units. Jan 23 01:45:03 localhost systemd[1]: Stopped target System Initialization. Jan 23 01:45:03 localhost systemd[1]: Stopped target Local File Systems. Jan 23 01:45:03 localhost systemd[1]: Stopped target Swaps. Jan 23 01:45:03 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped dracut mount hook. Jan 23 01:45:03 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped dracut pre-mount hook. Jan 23 01:45:03 localhost systemd[1]: Stopped target Local Encrypted Volumes. Jan 23 01:45:03 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 23 01:45:03 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped dracut initqueue hook. Jan 23 01:45:03 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Apply Kernel Variables. Jan 23 01:45:03 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Load Kernel Modules. Jan 23 01:45:03 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Create Volatile Files and Directories. Jan 23 01:45:03 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Coldplug All udev Devices. Jan 23 01:45:03 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped dracut pre-trigger hook. Jan 23 01:45:03 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 23 01:45:03 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Setup Virtual Console. Jan 23 01:45:03 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 23 01:45:03 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Closed udev Control Socket. Jan 23 01:45:03 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Closed udev Kernel Socket. Jan 23 01:45:03 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped dracut pre-udev hook. Jan 23 01:45:03 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped dracut cmdline hook. Jan 23 01:45:03 localhost systemd[1]: Starting Cleanup udev Database... Jan 23 01:45:03 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 23 01:45:03 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Create List of Static Device Nodes. Jan 23 01:45:03 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Stopped Create System Users. Jan 23 01:45:03 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 23 01:45:03 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 23 01:45:03 localhost systemd[1]: Finished Cleanup udev Database. Jan 23 01:45:03 localhost systemd[1]: Reached target Switch Root. Jan 23 01:45:03 localhost systemd[1]: Starting Switch Root... Jan 23 01:45:04 localhost systemd[1]: Switching root. Jan 23 01:45:04 localhost systemd-journald[284]: Journal stopped Jan 23 01:45:04 localhost systemd-journald[284]: Received SIGTERM from PID 1 (systemd). Jan 23 01:45:04 localhost kernel: audit: type=1404 audit(1769150704.052:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Jan 23 01:45:04 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 01:45:04 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 01:45:04 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 01:45:04 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 01:45:04 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 01:45:04 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 01:45:04 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 01:45:04 localhost kernel: audit: type=1403 audit(1769150704.133:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 23 01:45:04 localhost systemd[1]: Successfully loaded SELinux policy in 82.748ms. Jan 23 01:45:04 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.092ms. Jan 23 01:45:04 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 23 01:45:04 localhost systemd[1]: Detected virtualization kvm. Jan 23 01:45:04 localhost systemd[1]: Detected architecture x86-64. Jan 23 01:45:04 localhost systemd-rc-local-generator[581]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 01:45:04 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 01:45:04 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 23 01:45:04 localhost systemd[1]: Stopped Switch Root. Jan 23 01:45:04 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 23 01:45:04 localhost systemd[1]: Created slice Slice /system/getty. Jan 23 01:45:04 localhost systemd[1]: Created slice Slice /system/modprobe. Jan 23 01:45:04 localhost systemd[1]: Created slice Slice /system/serial-getty. Jan 23 01:45:04 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Jan 23 01:45:04 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Jan 23 01:45:04 localhost systemd[1]: Created slice User and Session Slice. Jan 23 01:45:04 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 23 01:45:04 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 23 01:45:04 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 23 01:45:04 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 23 01:45:04 localhost systemd[1]: Stopped target Switch Root. Jan 23 01:45:04 localhost systemd[1]: Stopped target Initrd File Systems. Jan 23 01:45:04 localhost systemd[1]: Stopped target Initrd Root File System. Jan 23 01:45:04 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Jan 23 01:45:04 localhost systemd[1]: Reached target Path Units. Jan 23 01:45:04 localhost systemd[1]: Reached target rpc_pipefs.target. Jan 23 01:45:04 localhost systemd[1]: Reached target Slice Units. Jan 23 01:45:04 localhost systemd[1]: Reached target Swaps. Jan 23 01:45:04 localhost systemd[1]: Reached target Local Verity Protected Volumes. Jan 23 01:45:04 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Jan 23 01:45:04 localhost systemd[1]: Reached target RPC Port Mapper. Jan 23 01:45:04 localhost systemd[1]: Listening on Process Core Dump Socket. Jan 23 01:45:04 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 23 01:45:04 localhost systemd[1]: Listening on udev Control Socket. Jan 23 01:45:04 localhost systemd[1]: Listening on udev Kernel Socket. Jan 23 01:45:04 localhost systemd[1]: Mounting Huge Pages File System... Jan 23 01:45:04 localhost systemd[1]: Mounting POSIX Message Queue File System... Jan 23 01:45:04 localhost systemd[1]: Mounting Kernel Debug File System... Jan 23 01:45:04 localhost systemd[1]: Mounting Kernel Trace File System... Jan 23 01:45:04 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 23 01:45:04 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 23 01:45:04 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 23 01:45:04 localhost systemd[1]: Starting Load Kernel Module drm... Jan 23 01:45:04 localhost systemd[1]: Starting Load Kernel Module fuse... Jan 23 01:45:04 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Jan 23 01:45:04 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 23 01:45:04 localhost systemd[1]: Stopped File System Check on Root Device. Jan 23 01:45:04 localhost systemd[1]: Stopped Journal Service. Jan 23 01:45:04 localhost systemd[1]: Starting Journal Service... Jan 23 01:45:04 localhost systemd[1]: Starting Load Kernel Modules... Jan 23 01:45:04 localhost systemd[1]: Starting Generate network units from Kernel command line... Jan 23 01:45:04 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Jan 23 01:45:04 localhost kernel: fuse: init (API version 7.36) Jan 23 01:45:04 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Jan 23 01:45:04 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 23 01:45:04 localhost systemd-journald[617]: Journal started Jan 23 01:45:04 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/3e33164a5d30c3060156ec878079cfde) is 8.0M, max 314.7M, 306.7M free. Jan 23 01:45:04 localhost systemd[1]: Queued start job for default target Multi-User System. Jan 23 01:45:04 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Jan 23 01:45:04 localhost systemd-modules-load[618]: Module 'msr' is built in Jan 23 01:45:04 localhost systemd[1]: Started Journal Service. Jan 23 01:45:04 localhost systemd[1]: Mounted Huge Pages File System. Jan 23 01:45:04 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Jan 23 01:45:04 localhost systemd[1]: Mounted POSIX Message Queue File System. Jan 23 01:45:04 localhost systemd[1]: Mounted Kernel Debug File System. Jan 23 01:45:04 localhost systemd[1]: Mounted Kernel Trace File System. Jan 23 01:45:04 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 23 01:45:04 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 23 01:45:04 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 23 01:45:04 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 23 01:45:04 localhost systemd[1]: Finished Load Kernel Module fuse. Jan 23 01:45:04 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Jan 23 01:45:04 localhost kernel: ACPI: bus type drm_connector registered Jan 23 01:45:04 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 23 01:45:04 localhost systemd[1]: Finished Load Kernel Module drm. Jan 23 01:45:04 localhost systemd[1]: Finished Load Kernel Modules. Jan 23 01:45:04 localhost systemd[1]: Finished Generate network units from Kernel command line. Jan 23 01:45:04 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Jan 23 01:45:04 localhost systemd[1]: Mounting FUSE Control File System... Jan 23 01:45:04 localhost systemd[1]: Mounting Kernel Configuration File System... Jan 23 01:45:04 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 23 01:45:04 localhost systemd[1]: Starting Rebuild Hardware Database... Jan 23 01:45:04 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Jan 23 01:45:04 localhost systemd[1]: Starting Load/Save Random Seed... Jan 23 01:45:04 localhost systemd[1]: Starting Apply Kernel Variables... Jan 23 01:45:04 localhost systemd[1]: Starting Create System Users... Jan 23 01:45:04 localhost systemd[1]: Mounted FUSE Control File System. Jan 23 01:45:04 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/3e33164a5d30c3060156ec878079cfde) is 8.0M, max 314.7M, 306.7M free. Jan 23 01:45:04 localhost systemd-journald[617]: Received client request to flush runtime journal. Jan 23 01:45:04 localhost systemd[1]: Mounted Kernel Configuration File System. Jan 23 01:45:04 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Jan 23 01:45:04 localhost systemd[1]: Finished Load/Save Random Seed. Jan 23 01:45:04 localhost systemd[1]: Finished Apply Kernel Variables. Jan 23 01:45:04 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 23 01:45:04 localhost systemd-sysusers[631]: Creating group 'sgx' with GID 989. Jan 23 01:45:04 localhost systemd-sysusers[631]: Creating group 'systemd-oom' with GID 988. Jan 23 01:45:04 localhost systemd-sysusers[631]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Jan 23 01:45:04 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 23 01:45:04 localhost systemd[1]: Finished Create System Users. Jan 23 01:45:04 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 23 01:45:04 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 23 01:45:04 localhost systemd[1]: Reached target Preparation for Local File Systems. Jan 23 01:45:04 localhost systemd[1]: Set up automount EFI System Partition Automount. Jan 23 01:45:05 localhost systemd[1]: Finished Rebuild Hardware Database. Jan 23 01:45:05 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 23 01:45:05 localhost systemd-udevd[635]: Using default interface naming scheme 'rhel-9.0'. Jan 23 01:45:05 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 23 01:45:05 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 23 01:45:05 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 23 01:45:05 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 23 01:45:05 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Jan 23 01:45:05 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Jan 23 01:45:05 localhost systemd-udevd[657]: Network interface NamePolicy= disabled on kernel command line. Jan 23 01:45:05 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Jan 23 01:45:05 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Jan 23 01:45:05 localhost systemd-fsck[678]: fsck.fat 4.2 (2021-01-31) Jan 23 01:45:05 localhost systemd-fsck[678]: /dev/vda2: 12 files, 1782/51145 clusters Jan 23 01:45:05 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Jan 23 01:45:05 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Jan 23 01:45:05 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jan 23 01:45:05 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Jan 23 01:45:05 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Jan 23 01:45:05 localhost kernel: Console: switching to colour dummy device 80x25 Jan 23 01:45:05 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Jan 23 01:45:05 localhost kernel: [drm] features: -context_init Jan 23 01:45:05 localhost kernel: [drm] number of scanouts: 1 Jan 23 01:45:05 localhost kernel: [drm] number of cap sets: 0 Jan 23 01:45:05 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Jan 23 01:45:05 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Jan 23 01:45:05 localhost kernel: Console: switching to colour frame buffer device 128x48 Jan 23 01:45:05 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Jan 23 01:45:05 localhost kernel: SVM: TSC scaling supported Jan 23 01:45:05 localhost kernel: kvm: Nested Virtualization enabled Jan 23 01:45:05 localhost kernel: SVM: kvm: Nested Paging enabled Jan 23 01:45:05 localhost kernel: SVM: LBR virtualization supported Jan 23 01:45:05 localhost systemd[1]: Mounting /boot... Jan 23 01:45:05 localhost kernel: XFS (vda3): Mounting V5 Filesystem Jan 23 01:45:05 localhost kernel: XFS (vda3): Ending clean mount Jan 23 01:45:05 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Jan 23 01:45:05 localhost systemd[1]: Mounted /boot. Jan 23 01:45:05 localhost systemd[1]: Mounting /boot/efi... Jan 23 01:45:05 localhost systemd[1]: Mounted /boot/efi. Jan 23 01:45:05 localhost systemd[1]: Reached target Local File Systems. Jan 23 01:45:05 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 23 01:45:05 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Jan 23 01:45:05 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 23 01:45:05 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 23 01:45:05 localhost systemd[1]: Starting Automatic Boot Loader Update... Jan 23 01:45:05 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Jan 23 01:45:05 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 23 01:45:05 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 717 (bootctl) Jan 23 01:45:05 localhost systemd[1]: Starting File System Check on /dev/vda2... Jan 23 01:45:05 localhost systemd[1]: Finished File System Check on /dev/vda2. Jan 23 01:45:05 localhost systemd[1]: Mounting EFI System Partition Automount... Jan 23 01:45:05 localhost systemd[1]: Mounted EFI System Partition Automount. Jan 23 01:45:05 localhost systemd[1]: Finished Automatic Boot Loader Update. Jan 23 01:45:05 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 23 01:45:05 localhost systemd[1]: Starting Security Auditing Service... Jan 23 01:45:05 localhost systemd[1]: Starting RPC Bind... Jan 23 01:45:05 localhost systemd[1]: Starting Rebuild Journal Catalog... Jan 23 01:45:05 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 23 01:45:05 localhost auditd[726]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Jan 23 01:45:05 localhost auditd[726]: Init complete, auditd 3.0.7 listening for events (startup state enable) Jan 23 01:45:05 localhost systemd[1]: Finished Rebuild Journal Catalog. Jan 23 01:45:05 localhost systemd[1]: Starting Update is Completed... Jan 23 01:45:05 localhost systemd[1]: Started RPC Bind. Jan 23 01:45:05 localhost systemd[1]: Finished Update is Completed. Jan 23 01:45:05 localhost augenrules[731]: /sbin/augenrules: No change Jan 23 01:45:05 localhost augenrules[743]: No rules Jan 23 01:45:05 localhost augenrules[743]: enabled 1 Jan 23 01:45:05 localhost augenrules[743]: failure 1 Jan 23 01:45:05 localhost augenrules[743]: pid 726 Jan 23 01:45:05 localhost augenrules[743]: rate_limit 0 Jan 23 01:45:05 localhost augenrules[743]: backlog_limit 8192 Jan 23 01:45:05 localhost augenrules[743]: lost 0 Jan 23 01:45:05 localhost augenrules[743]: backlog 1 Jan 23 01:45:05 localhost augenrules[743]: backlog_wait_time 60000 Jan 23 01:45:05 localhost augenrules[743]: backlog_wait_time_actual 0 Jan 23 01:45:05 localhost augenrules[743]: enabled 1 Jan 23 01:45:05 localhost augenrules[743]: failure 1 Jan 23 01:45:05 localhost augenrules[743]: pid 726 Jan 23 01:45:05 localhost augenrules[743]: rate_limit 0 Jan 23 01:45:05 localhost augenrules[743]: backlog_limit 8192 Jan 23 01:45:05 localhost augenrules[743]: lost 0 Jan 23 01:45:05 localhost augenrules[743]: backlog 2 Jan 23 01:45:05 localhost augenrules[743]: backlog_wait_time 60000 Jan 23 01:45:05 localhost augenrules[743]: backlog_wait_time_actual 0 Jan 23 01:45:05 localhost augenrules[743]: enabled 1 Jan 23 01:45:05 localhost augenrules[743]: failure 1 Jan 23 01:45:05 localhost augenrules[743]: pid 726 Jan 23 01:45:05 localhost augenrules[743]: rate_limit 0 Jan 23 01:45:05 localhost augenrules[743]: backlog_limit 8192 Jan 23 01:45:05 localhost augenrules[743]: lost 0 Jan 23 01:45:05 localhost augenrules[743]: backlog 0 Jan 23 01:45:05 localhost augenrules[743]: backlog_wait_time 60000 Jan 23 01:45:05 localhost augenrules[743]: backlog_wait_time_actual 0 Jan 23 01:45:05 localhost systemd[1]: Started Security Auditing Service. Jan 23 01:45:05 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 23 01:45:05 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 23 01:45:05 localhost systemd[1]: Reached target System Initialization. Jan 23 01:45:05 localhost systemd[1]: Started dnf makecache --timer. Jan 23 01:45:05 localhost systemd[1]: Started Daily rotation of log files. Jan 23 01:45:05 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 23 01:45:05 localhost systemd[1]: Reached target Timer Units. Jan 23 01:45:05 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 23 01:45:05 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Jan 23 01:45:05 localhost systemd[1]: Reached target Socket Units. Jan 23 01:45:05 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Jan 23 01:45:05 localhost systemd[1]: Starting D-Bus System Message Bus... Jan 23 01:45:05 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 23 01:45:05 localhost systemd[1]: Started D-Bus System Message Bus. Jan 23 01:45:05 localhost systemd[1]: Reached target Basic System. Jan 23 01:45:05 localhost systemd[1]: Starting NTP client/server... Jan 23 01:45:05 localhost journal[752]: Ready Jan 23 01:45:05 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Jan 23 01:45:05 localhost systemd[1]: Started irqbalance daemon. Jan 23 01:45:05 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Jan 23 01:45:05 localhost systemd[1]: Starting System Logging Service... Jan 23 01:45:05 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 01:45:05 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 01:45:05 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 01:45:05 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 01:45:05 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Jan 23 01:45:05 localhost systemd[1]: Reached target User and Group Name Lookups. Jan 23 01:45:05 localhost systemd[1]: Starting User Login Management... Jan 23 01:45:05 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Jan 23 01:45:05 localhost rsyslogd[760]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="760" x-info="https://www.rsyslog.com"] start Jan 23 01:45:05 localhost systemd[1]: Started System Logging Service. Jan 23 01:45:05 localhost rsyslogd[760]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Jan 23 01:45:05 localhost chronyd[767]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Jan 23 01:45:05 localhost chronyd[767]: Using right/UTC timezone to obtain leap second data Jan 23 01:45:05 localhost chronyd[767]: Loaded seccomp filter (level 2) Jan 23 01:45:05 localhost systemd[1]: Started NTP client/server. Jan 23 01:45:06 localhost systemd-logind[762]: New seat seat0. Jan 23 01:45:06 localhost systemd-logind[762]: Watching system buttons on /dev/input/event0 (Power Button) Jan 23 01:45:06 localhost systemd-logind[762]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 23 01:45:06 localhost systemd[1]: Started User Login Management. Jan 23 01:45:06 localhost rsyslogd[760]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 01:45:06 localhost cloud-init[771]: Cloud-init v. 22.1-9.el9 running 'init-local' at Fri, 23 Jan 2026 06:45:06 +0000. Up 5.38 seconds. Jan 23 01:45:06 localhost systemd[1]: Starting Hostname Service... Jan 23 01:45:06 localhost systemd[1]: Started Hostname Service. Jan 23 01:45:06 localhost systemd-hostnamed[785]: Hostname set to (static) Jan 23 01:45:06 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Jan 23 01:45:06 localhost systemd[1]: Reached target Preparation for Network. Jan 23 01:45:06 localhost systemd[1]: Starting Network Manager... Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6652] NetworkManager (version 1.42.2-1.el9) is starting... (boot:b9701254-61d8-46a0-b00d-82b8fb7576e9) Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6659] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Jan 23 01:45:06 localhost systemd[1]: Started Network Manager. Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6691] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Jan 23 01:45:06 localhost systemd[1]: Reached target Network. Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6738] manager[0x55b1f09b5020]: monitoring kernel firmware directory '/lib/firmware'. Jan 23 01:45:06 localhost systemd[1]: Starting Network Manager Wait Online... Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6781] hostname: hostname: using hostnamed Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6782] hostname: static hostname changed from (none) to "np0005593102.novalocal" Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6788] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Jan 23 01:45:06 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Jan 23 01:45:06 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6935] manager[0x55b1f09b5020]: rfkill: Wi-Fi hardware radio set enabled Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6935] manager[0x55b1f09b5020]: rfkill: WWAN hardware radio set enabled Jan 23 01:45:06 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Jan 23 01:45:06 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6992] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6993] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6995] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.6996] manager: Networking is enabled by state file Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7008] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7008] settings: Loaded settings plugin: keyfile (internal) Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7035] dhcp: init: Using DHCP client 'internal' Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7038] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7051] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7057] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7065] device (lo): Activation: starting connection 'lo' (37eb8771-8a11-4184-aec7-8966c11e9eae) Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7073] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7075] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Jan 23 01:45:06 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7119] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7121] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7122] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7124] device (eth0): carrier: link connected Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7126] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7131] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7138] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7143] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7144] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7145] manager: NetworkManager state is now CONNECTING Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7147] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:06 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7176] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7179] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:45:06 localhost systemd[1]: Started GSSAPI Proxy Daemon. Jan 23 01:45:06 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 23 01:45:06 localhost systemd[1]: Reached target NFS client services. Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7239] dhcp4 (eth0): state changed new lease, address=38.102.83.246 Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7242] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7261] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:06 localhost systemd[1]: Reached target Preparation for Remote File Systems. Jan 23 01:45:06 localhost systemd[1]: Reached target Remote File Systems. Jan 23 01:45:06 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 23 01:45:06 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7494] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7495] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7496] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7500] device (lo): Activation: successful, device activated. Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7504] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7507] manager: NetworkManager state is now CONNECTED_SITE Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7509] device (eth0): Activation: successful, device activated. Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7512] manager: NetworkManager state is now CONNECTED_GLOBAL Jan 23 01:45:06 localhost NetworkManager[790]: [1769150706.7514] manager: startup complete Jan 23 01:45:06 localhost systemd[1]: Finished Network Manager Wait Online. Jan 23 01:45:06 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Jan 23 01:45:06 localhost cloud-init[1030]: Cloud-init v. 22.1-9.el9 running 'init' at Fri, 23 Jan 2026 06:45:06 +0000. Up 6.11 seconds. Jan 23 01:45:06 localhost systemd[1]: Starting Authorization Manager... Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: ++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +--------+------+-----------------------------+---------------+--------+-------------------+ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +--------+------+-----------------------------+---------------+--------+-------------------+ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | eth0 | True | 38.102.83.246 | 255.255.255.0 | global | fa:16:3e:4c:0f:bd | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | eth0 | True | fe80::f816:3eff:fe4c:fbd/64 | . | link | fa:16:3e:4c:0f:bd | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | lo | True | ::1/128 | . | host | . | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +--------+------+-----------------------------+---------------+--------+-------------------+ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | Route | Destination | Gateway | Interface | Flags | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: | 3 | multicast | :: | eth0 | U | Jan 23 01:45:07 localhost cloud-init[1030]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 23 01:45:07 localhost systemd[1]: Started Dynamic System Tuning Daemon. Jan 23 01:45:07 localhost polkitd[1032]: Started polkitd version 0.117 Jan 23 01:45:07 localhost systemd[1]: Started Authorization Manager. Jan 23 01:45:09 localhost cloud-init[1030]: Generating public/private rsa key pair. Jan 23 01:45:09 localhost cloud-init[1030]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Jan 23 01:45:09 localhost cloud-init[1030]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Jan 23 01:45:09 localhost cloud-init[1030]: The key fingerprint is: Jan 23 01:45:09 localhost cloud-init[1030]: SHA256:RdcZ0X8fpeXRRiIITAw/0gJFHeoj9eE/gUkb2U2QWBE root@np0005593102.novalocal Jan 23 01:45:09 localhost cloud-init[1030]: The key's randomart image is: Jan 23 01:45:09 localhost cloud-init[1030]: +---[RSA 3072]----+ Jan 23 01:45:09 localhost cloud-init[1030]: | .o+*+=E*+.+*o| Jan 23 01:45:09 localhost cloud-init[1030]: | . +=+o+ .oo*| Jan 23 01:45:09 localhost cloud-init[1030]: | = O o . =+| Jan 23 01:45:09 localhost cloud-init[1030]: | o * O ..+| Jan 23 01:45:09 localhost cloud-init[1030]: | . o S . +| Jan 23 01:45:09 localhost cloud-init[1030]: | . . . . .| Jan 23 01:45:09 localhost cloud-init[1030]: | o | Jan 23 01:45:09 localhost cloud-init[1030]: | . | Jan 23 01:45:09 localhost cloud-init[1030]: | | Jan 23 01:45:09 localhost cloud-init[1030]: +----[SHA256]-----+ Jan 23 01:45:09 localhost cloud-init[1030]: Generating public/private ecdsa key pair. Jan 23 01:45:09 localhost cloud-init[1030]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Jan 23 01:45:09 localhost cloud-init[1030]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Jan 23 01:45:09 localhost cloud-init[1030]: The key fingerprint is: Jan 23 01:45:09 localhost cloud-init[1030]: SHA256:N0e1zkWWlmOf7aAitbWg92fj/+r8XJx82kYTrx3w7QI root@np0005593102.novalocal Jan 23 01:45:09 localhost cloud-init[1030]: The key's randomart image is: Jan 23 01:45:09 localhost cloud-init[1030]: +---[ECDSA 256]---+ Jan 23 01:45:09 localhost cloud-init[1030]: | . =| Jan 23 01:45:09 localhost cloud-init[1030]: | . X | Jan 23 01:45:09 localhost cloud-init[1030]: | . + *| Jan 23 01:45:09 localhost cloud-init[1030]: | o..+.+o| Jan 23 01:45:09 localhost cloud-init[1030]: | Soo+.o=o+| Jan 23 01:45:09 localhost cloud-init[1030]: | o.+oE .=*| Jan 23 01:45:09 localhost cloud-init[1030]: | o o . B*| Jan 23 01:45:09 localhost cloud-init[1030]: | ..*+*| Jan 23 01:45:09 localhost cloud-init[1030]: | =*BB| Jan 23 01:45:09 localhost cloud-init[1030]: +----[SHA256]-----+ Jan 23 01:45:09 localhost cloud-init[1030]: Generating public/private ed25519 key pair. Jan 23 01:45:09 localhost cloud-init[1030]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Jan 23 01:45:09 localhost cloud-init[1030]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Jan 23 01:45:09 localhost cloud-init[1030]: The key fingerprint is: Jan 23 01:45:09 localhost cloud-init[1030]: SHA256:BpetamT2CgIJH9/QLFhYYQIT+xRv7aHGE8qj0N0a4xA root@np0005593102.novalocal Jan 23 01:45:09 localhost cloud-init[1030]: The key's randomart image is: Jan 23 01:45:09 localhost cloud-init[1030]: +--[ED25519 256]--+ Jan 23 01:45:09 localhost cloud-init[1030]: |+ooo=. | Jan 23 01:45:09 localhost cloud-init[1030]: | o.B + o | Jan 23 01:45:09 localhost cloud-init[1030]: |o E * * o . | Jan 23 01:45:09 localhost cloud-init[1030]: |.B O O + . | Jan 23 01:45:09 localhost cloud-init[1030]: |+ O X B S | Jan 23 01:45:09 localhost cloud-init[1030]: |.o = O + | Jan 23 01:45:09 localhost cloud-init[1030]: |. . + o . | Jan 23 01:45:09 localhost cloud-init[1030]: | . o . | Jan 23 01:45:09 localhost cloud-init[1030]: | . | Jan 23 01:45:09 localhost cloud-init[1030]: +----[SHA256]-----+ Jan 23 01:45:09 localhost sm-notify[1129]: Version 2.5.4 starting Jan 23 01:45:09 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Jan 23 01:45:09 localhost systemd[1]: Reached target Cloud-config availability. Jan 23 01:45:09 localhost systemd[1]: Reached target Network is Online. Jan 23 01:45:09 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Jan 23 01:45:09 localhost sshd[1130]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:09 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Jan 23 01:45:09 localhost systemd[1]: Starting Crash recovery kernel arming... Jan 23 01:45:09 localhost systemd[1]: Starting Notify NFS peers of a restart... Jan 23 01:45:09 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 01:45:09 localhost systemd[1]: Starting Permit User Sessions... Jan 23 01:45:09 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 01:45:09 localhost systemd[1]: Started Notify NFS peers of a restart. Jan 23 01:45:09 localhost systemd[1]: Finished Permit User Sessions. Jan 23 01:45:09 localhost systemd[1]: Started Command Scheduler. Jan 23 01:45:09 localhost systemd[1]: Started Getty on tty1. Jan 23 01:45:09 localhost systemd[1]: Started Serial Getty on ttyS0. Jan 23 01:45:09 localhost systemd[1]: Reached target Login Prompts. Jan 23 01:45:09 localhost systemd[1]: Reached target Multi-User System. Jan 23 01:45:09 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Jan 23 01:45:09 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 23 01:45:09 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Jan 23 01:45:09 localhost kdumpctl[1133]: kdump: No kdump initial ramdisk found. Jan 23 01:45:09 localhost kdumpctl[1133]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Jan 23 01:45:09 localhost cloud-init[1260]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Fri, 23 Jan 2026 06:45:09 +0000. Up 8.55 seconds. Jan 23 01:45:09 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Jan 23 01:45:09 localhost systemd[1]: Starting Execute cloud user/final scripts... Jan 23 01:45:09 localhost dracut[1416]: dracut-057-21.git20230214.el9 Jan 23 01:45:09 localhost cloud-init[1422]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Fri, 23 Jan 2026 06:45:09 +0000. Up 8.90 seconds. Jan 23 01:45:09 localhost cloud-init[1435]: ############################################################# Jan 23 01:45:09 localhost cloud-init[1436]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Jan 23 01:45:09 localhost cloud-init[1441]: 256 SHA256:N0e1zkWWlmOf7aAitbWg92fj/+r8XJx82kYTrx3w7QI root@np0005593102.novalocal (ECDSA) Jan 23 01:45:09 localhost cloud-init[1449]: 256 SHA256:BpetamT2CgIJH9/QLFhYYQIT+xRv7aHGE8qj0N0a4xA root@np0005593102.novalocal (ED25519) Jan 23 01:45:09 localhost dracut[1419]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Jan 23 01:45:09 localhost cloud-init[1456]: 3072 SHA256:RdcZ0X8fpeXRRiIITAw/0gJFHeoj9eE/gUkb2U2QWBE root@np0005593102.novalocal (RSA) Jan 23 01:45:09 localhost cloud-init[1459]: -----END SSH HOST KEY FINGERPRINTS----- Jan 23 01:45:09 localhost cloud-init[1461]: ############################################################# Jan 23 01:45:09 localhost cloud-init[1422]: Cloud-init v. 22.1-9.el9 finished at Fri, 23 Jan 2026 06:45:09 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 9.13 seconds Jan 23 01:45:10 localhost systemd[1]: Reloading Network Manager... Jan 23 01:45:10 localhost NetworkManager[790]: [1769150710.0977] audit: op="reload" arg="0" pid=1535 uid=0 result="success" Jan 23 01:45:10 localhost NetworkManager[790]: [1769150710.0986] config: signal: SIGHUP (no changes from disk) Jan 23 01:45:10 localhost systemd[1]: Reloaded Network Manager. Jan 23 01:45:10 localhost systemd[1]: Finished Execute cloud user/final scripts. Jan 23 01:45:10 localhost systemd[1]: Reached target Cloud-init target. Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 23 01:45:10 localhost dracut[1419]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 23 01:45:10 localhost dracut[1419]: memstrack is not available Jan 23 01:45:10 localhost dracut[1419]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 23 01:45:10 localhost dracut[1419]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 23 01:45:10 localhost dracut[1419]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 23 01:45:10 localhost dracut[1419]: memstrack is not available Jan 23 01:45:10 localhost dracut[1419]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 23 01:45:11 localhost dracut[1419]: *** Including module: systemd *** Jan 23 01:45:11 localhost dracut[1419]: *** Including module: systemd-initrd *** Jan 23 01:45:11 localhost dracut[1419]: *** Including module: i18n *** Jan 23 01:45:11 localhost dracut[1419]: No KEYMAP configured. Jan 23 01:45:11 localhost dracut[1419]: *** Including module: drm *** Jan 23 01:45:11 localhost chronyd[767]: Selected source 23.128.92.19 (2.rhel.pool.ntp.org) Jan 23 01:45:11 localhost chronyd[767]: System clock TAI offset set to 37 seconds Jan 23 01:45:11 localhost dracut[1419]: *** Including module: prefixdevname *** Jan 23 01:45:11 localhost dracut[1419]: *** Including module: kernel-modules *** Jan 23 01:45:12 localhost dracut[1419]: *** Including module: kernel-modules-extra *** Jan 23 01:45:12 localhost dracut[1419]: *** Including module: qemu *** Jan 23 01:45:12 localhost dracut[1419]: *** Including module: fstab-sys *** Jan 23 01:45:12 localhost dracut[1419]: *** Including module: rootfs-block *** Jan 23 01:45:12 localhost dracut[1419]: *** Including module: terminfo *** Jan 23 01:45:12 localhost dracut[1419]: *** Including module: udev-rules *** Jan 23 01:45:12 localhost dracut[1419]: Skipping udev rule: 91-permissions.rules Jan 23 01:45:12 localhost dracut[1419]: Skipping udev rule: 80-drivers-modprobe.rules Jan 23 01:45:12 localhost dracut[1419]: *** Including module: virtiofs *** Jan 23 01:45:12 localhost dracut[1419]: *** Including module: dracut-systemd *** Jan 23 01:45:13 localhost dracut[1419]: *** Including module: usrmount *** Jan 23 01:45:13 localhost dracut[1419]: *** Including module: base *** Jan 23 01:45:13 localhost dracut[1419]: *** Including module: fs-lib *** Jan 23 01:45:13 localhost dracut[1419]: *** Including module: kdumpbase *** Jan 23 01:45:13 localhost dracut[1419]: *** Including module: microcode_ctl-fw_dir_override *** Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl module: mangling fw_dir Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: configuration "intel" is ignored Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: configuration "intel-06-2d-07" is ignored Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: configuration "intel-06-4e-03" is ignored Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: configuration "intel-06-4f-01" is ignored Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: configuration "intel-06-55-04" is ignored Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: configuration "intel-06-5e-03" is ignored Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: configuration "intel-06-8c-01" is ignored Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Jan 23 01:45:13 localhost dracut[1419]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Jan 23 01:45:13 localhost dracut[1419]: *** Including module: shutdown *** Jan 23 01:45:13 localhost dracut[1419]: *** Including module: squash *** Jan 23 01:45:13 localhost dracut[1419]: *** Including modules done *** Jan 23 01:45:13 localhost dracut[1419]: *** Installing kernel module dependencies *** Jan 23 01:45:14 localhost dracut[1419]: *** Installing kernel module dependencies done *** Jan 23 01:45:14 localhost dracut[1419]: *** Resolving executable dependencies *** Jan 23 01:45:15 localhost dracut[1419]: *** Resolving executable dependencies done *** Jan 23 01:45:15 localhost dracut[1419]: *** Hardlinking files *** Jan 23 01:45:15 localhost dracut[1419]: Mode: real Jan 23 01:45:15 localhost dracut[1419]: Files: 1099 Jan 23 01:45:15 localhost dracut[1419]: Linked: 3 files Jan 23 01:45:15 localhost dracut[1419]: Compared: 0 xattrs Jan 23 01:45:15 localhost dracut[1419]: Compared: 373 files Jan 23 01:45:15 localhost dracut[1419]: Saved: 61.04 KiB Jan 23 01:45:15 localhost dracut[1419]: Duration: 0.029535 seconds Jan 23 01:45:15 localhost dracut[1419]: *** Hardlinking files done *** Jan 23 01:45:15 localhost dracut[1419]: Could not find 'strip'. Not stripping the initramfs. Jan 23 01:45:15 localhost dracut[1419]: *** Generating early-microcode cpio image *** Jan 23 01:45:15 localhost dracut[1419]: *** Constructing AuthenticAMD.bin *** Jan 23 01:45:15 localhost dracut[1419]: *** Store current command line parameters *** Jan 23 01:45:15 localhost dracut[1419]: Stored kernel commandline: Jan 23 01:45:15 localhost dracut[1419]: No dracut internal kernel commandline stored in the initramfs Jan 23 01:45:15 localhost dracut[1419]: *** Install squash loader *** Jan 23 01:45:16 localhost dracut[1419]: *** Squashing the files inside the initramfs *** Jan 23 01:45:16 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 01:45:17 localhost dracut[1419]: *** Squashing the files inside the initramfs done *** Jan 23 01:45:17 localhost dracut[1419]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Jan 23 01:45:17 localhost dracut[1419]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Jan 23 01:45:17 localhost kdumpctl[1133]: kdump: kexec: loaded kdump kernel Jan 23 01:45:17 localhost kdumpctl[1133]: kdump: Starting kdump: [OK] Jan 23 01:45:17 localhost systemd[1]: Finished Crash recovery kernel arming. Jan 23 01:45:17 localhost systemd[1]: Startup finished in 1.185s (kernel) + 2.023s (initrd) + 13.828s (userspace) = 17.037s. Jan 23 01:45:25 localhost sshd[4153]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4155]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4157]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4159]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4161]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4163]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4165]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4167]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4169]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:36 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 01:45:47 localhost sshd[4174]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:48 localhost systemd[1]: Created slice User Slice of UID 1000. Jan 23 01:45:48 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Jan 23 01:45:48 localhost systemd-logind[762]: New session 1 of user zuul. Jan 23 01:45:48 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Jan 23 01:45:48 localhost systemd[1]: Starting User Manager for UID 1000... Jan 23 01:45:48 localhost systemd[4178]: Queued start job for default target Main User Target. Jan 23 01:45:48 localhost systemd[4178]: Created slice User Application Slice. Jan 23 01:45:48 localhost systemd[4178]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 01:45:48 localhost systemd[4178]: Started Daily Cleanup of User's Temporary Directories. Jan 23 01:45:48 localhost systemd[4178]: Reached target Paths. Jan 23 01:45:48 localhost systemd[4178]: Reached target Timers. Jan 23 01:45:48 localhost systemd[4178]: Starting D-Bus User Message Bus Socket... Jan 23 01:45:48 localhost systemd[4178]: Starting Create User's Volatile Files and Directories... Jan 23 01:45:48 localhost systemd[4178]: Listening on D-Bus User Message Bus Socket. Jan 23 01:45:48 localhost systemd[4178]: Reached target Sockets. Jan 23 01:45:48 localhost systemd[4178]: Finished Create User's Volatile Files and Directories. Jan 23 01:45:48 localhost systemd[4178]: Reached target Basic System. Jan 23 01:45:48 localhost systemd[4178]: Reached target Main User Target. Jan 23 01:45:48 localhost systemd[4178]: Startup finished in 112ms. Jan 23 01:45:48 localhost systemd[1]: Started User Manager for UID 1000. Jan 23 01:45:48 localhost systemd[1]: Started Session 1 of User zuul. Jan 23 01:45:48 localhost python3[4230]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:45:55 localhost python3[4248]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:46:04 localhost python3[4301]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:46:05 localhost python3[4331]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Jan 23 01:46:08 localhost python3[4347]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:09 localhost python3[4361]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:10 localhost python3[4420]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:10 localhost python3[4461]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769150770.1192899-344-150389970888188/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa follow=False checksum=332ac6e5e102fad0efb63e7711468addf4cebb64 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:12 localhost python3[4534]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:12 localhost python3[4575]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769150771.9111896-442-111935393679433/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa.pub follow=False checksum=a2dfb4df29ea2fda7d7e4b28a63ca08610edd25d backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:14 localhost python3[4603]: ansible-ping Invoked with data=pong Jan 23 01:46:16 localhost python3[4617]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:46:21 localhost python3[4670]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Jan 23 01:46:23 localhost python3[4692]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:23 localhost python3[4706]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:23 localhost python3[4720]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:25 localhost python3[4734]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:25 localhost python3[4748]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:25 localhost python3[4762]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:28 localhost python3[4779]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:29 localhost python3[4827]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:29 localhost python3[4870]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1769150789.0289896-57-149946093019233/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:31 localhost python3[4898]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:31 localhost python3[4912]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:31 localhost python3[4926]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4940]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4954]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4968]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4982]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[4996]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[5010]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[5024]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[5038]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5052]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5066]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5080]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5094]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5108]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5122]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5136]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5150]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5164]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5178]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5192]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5206]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5220]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5234]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:38 localhost python3[5248]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:45 localhost python3[5264]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Jan 23 01:46:45 localhost systemd[1]: Starting Time & Date Service... Jan 23 01:46:46 localhost systemd[1]: Started Time & Date Service. Jan 23 01:46:47 localhost systemd-timedated[5266]: Changed time zone to 'UTC' (UTC). Jan 23 01:46:48 localhost python3[5285]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:49 localhost python3[5331]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:50 localhost python3[5372]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1769150809.5082355-452-65114602076246/source _original_basename=tmpcxevhmju follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:51 localhost python3[5432]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:51 localhost python3[5473]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1769150811.1037593-542-234077577602108/source _original_basename=tmpikeo7kv6 follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:53 localhost python3[5535]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:53 localhost python3[5578]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1769150813.0722253-687-226154097594245/source _original_basename=tmplw4s5h_w follow=False checksum=c5dc93499645bc89ff1f2366754d95ffd71986c3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:55 localhost python3[5606]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:46:55 localhost python3[5622]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:46:56 localhost python3[5672]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:56 localhost python3[5715]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1769150816.376785-813-148864717445362/source _original_basename=tmp80qdtlag follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:58 localhost python3[5746]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163ec2-ffbe-a2b6-1805-000000000023-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:47:00 localhost python3[5764]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a2b6-1805-000000000024-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 23 01:47:02 localhost python3[5782]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:47:17 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Jan 23 01:47:24 localhost python3[5801]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:47:57 localhost systemd[4178]: Starting Mark boot as successful... Jan 23 01:47:57 localhost systemd[4178]: Finished Mark boot as successful. Jan 23 01:48:24 localhost systemd-logind[762]: Session 1 logged out. Waiting for processes to exit. Jan 23 01:49:07 localhost systemd[1]: Unmounting EFI System Partition Automount... Jan 23 01:49:07 localhost systemd[1]: efi.mount: Deactivated successfully. Jan 23 01:49:07 localhost systemd[1]: Unmounted EFI System Partition Automount. Jan 23 01:49:42 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Jan 23 01:49:42 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Jan 23 01:49:42 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Jan 23 01:49:42 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Jan 23 01:49:42 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Jan 23 01:49:42 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Jan 23 01:49:42 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Jan 23 01:49:42 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Jan 23 01:49:42 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Jan 23 01:49:42 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8772] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Jan 23 01:49:42 localhost systemd-udevd[5807]: Network interface NamePolicy= disabled on kernel command line. Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8934] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8966] settings: (eth1): created default wired connection 'Wired connection 1' Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8969] device (eth1): carrier: link connected Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8971] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8975] policy: auto-activating connection 'Wired connection 1' (4d5ce3f5-83f3-32c7-ab95-5efd56113f79) Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8980] device (eth1): Activation: starting connection 'Wired connection 1' (4d5ce3f5-83f3-32c7-ab95-5efd56113f79) Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8981] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8984] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8988] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Jan 23 01:49:42 localhost NetworkManager[790]: [1769150982.8991] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:49:43 localhost sshd[5810]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:49:43 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Jan 23 01:49:43 localhost systemd-logind[762]: New session 3 of user zuul. Jan 23 01:49:43 localhost systemd[1]: Started Session 3 of User zuul. Jan 23 01:49:44 localhost python3[5827]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163ec2-ffbe-a5a1-fbdc-0000000002c1-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:49:57 localhost python3[5877]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:49:57 localhost python3[5920]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769150997.0031943-333-11980920948460/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=51d36fdf67e3ccd2c419530b9722c6a8c9ab1e39 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:49:58 localhost python3[5950]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 01:49:58 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Jan 23 01:49:58 localhost systemd[1]: Stopped Network Manager Wait Online. Jan 23 01:49:58 localhost systemd[1]: Stopping Network Manager Wait Online... Jan 23 01:49:58 localhost NetworkManager[790]: [1769150998.4197] caught SIGTERM, shutting down normally. Jan 23 01:49:58 localhost systemd[1]: Stopping Network Manager... Jan 23 01:49:58 localhost NetworkManager[790]: [1769150998.4296] dhcp4 (eth0): canceled DHCP transaction Jan 23 01:49:58 localhost NetworkManager[790]: [1769150998.4296] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:49:58 localhost NetworkManager[790]: [1769150998.4297] dhcp4 (eth0): state changed no lease Jan 23 01:49:58 localhost NetworkManager[790]: [1769150998.4298] manager: NetworkManager state is now CONNECTING Jan 23 01:49:58 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 01:49:58 localhost NetworkManager[790]: [1769150998.4387] dhcp4 (eth1): canceled DHCP transaction Jan 23 01:49:58 localhost NetworkManager[790]: [1769150998.4388] dhcp4 (eth1): state changed no lease Jan 23 01:49:58 localhost NetworkManager[790]: [1769150998.4435] exiting (success) Jan 23 01:49:58 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 01:49:58 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Jan 23 01:49:58 localhost systemd[1]: Stopped Network Manager. Jan 23 01:49:58 localhost systemd[1]: NetworkManager.service: Consumed 1.635s CPU time. Jan 23 01:49:58 localhost systemd[1]: Starting Network Manager... Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.4970] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:b9701254-61d8-46a0-b00d-82b8fb7576e9) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.4972] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Jan 23 01:49:58 localhost systemd[1]: Started Network Manager. Jan 23 01:49:58 localhost systemd[1]: Starting Network Manager Wait Online... Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5041] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5098] manager[0x55f4055a8090]: monitoring kernel firmware directory '/lib/firmware'. Jan 23 01:49:58 localhost systemd[1]: Starting Hostname Service... Jan 23 01:49:58 localhost systemd[1]: Started Hostname Service. Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5909] hostname: hostname: using hostnamed Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5911] hostname: static hostname changed from (none) to "np0005593102.novalocal" Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5914] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5918] manager[0x55f4055a8090]: rfkill: Wi-Fi hardware radio set enabled Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5918] manager[0x55f4055a8090]: rfkill: WWAN hardware radio set enabled Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5950] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5951] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5952] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5953] manager: Networking is enabled by state file Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5960] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5962] settings: Loaded settings plugin: keyfile (internal) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5991] dhcp: init: Using DHCP client 'internal' Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.5995] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6001] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6007] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6017] device (lo): Activation: starting connection 'lo' (37eb8771-8a11-4184-aec7-8966c11e9eae) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6024] device (eth0): carrier: link connected Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6030] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6037] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6038] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6045] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6055] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6062] device (eth1): carrier: link connected Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6067] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6073] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (4d5ce3f5-83f3-32c7-ab95-5efd56113f79) (indicated) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6074] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6080] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6088] device (eth1): Activation: starting connection 'Wired connection 1' (4d5ce3f5-83f3-32c7-ab95-5efd56113f79) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6110] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6122] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6126] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6130] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6135] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6138] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6141] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6145] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6151] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6155] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6168] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6174] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6207] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6213] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6218] device (lo): Activation: successful, device activated. Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6270] dhcp4 (eth0): state changed new lease, address=38.102.83.246 Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6274] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6326] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6353] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6355] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6358] manager: NetworkManager state is now CONNECTED_SITE Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6361] device (eth0): Activation: successful, device activated. Jan 23 01:49:58 localhost NetworkManager[5962]: [1769150998.6365] manager: NetworkManager state is now CONNECTED_GLOBAL Jan 23 01:49:58 localhost python3[6015]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163ec2-ffbe-a5a1-fbdc-00000000010a-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:50:08 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 01:50:28 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 01:50:43 localhost NetworkManager[5962]: [1769151043.8426] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:43 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 01:50:43 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 01:50:43 localhost NetworkManager[5962]: [1769151043.8638] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:43 localhost NetworkManager[5962]: [1769151043.8641] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:43 localhost NetworkManager[5962]: [1769151043.8650] device (eth1): Activation: successful, device activated. Jan 23 01:50:43 localhost NetworkManager[5962]: [1769151043.8657] manager: startup complete Jan 23 01:50:43 localhost systemd[1]: Finished Network Manager Wait Online. Jan 23 01:50:53 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 01:50:57 localhost systemd[4178]: Created slice User Background Tasks Slice. Jan 23 01:50:57 localhost systemd[4178]: Starting Cleanup of User's Temporary Files and Directories... Jan 23 01:50:57 localhost systemd[4178]: Finished Cleanup of User's Temporary Files and Directories. Jan 23 01:50:58 localhost systemd[1]: session-3.scope: Deactivated successfully. Jan 23 01:50:58 localhost systemd[1]: session-3.scope: Consumed 1.402s CPU time. Jan 23 01:50:58 localhost systemd-logind[762]: Session 3 logged out. Waiting for processes to exit. Jan 23 01:50:58 localhost systemd-logind[762]: Removed session 3. Jan 23 01:53:03 localhost sshd[6050]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:53:03 localhost systemd-logind[762]: New session 4 of user zuul. Jan 23 01:53:03 localhost systemd[1]: Started Session 4 of User zuul. Jan 23 01:53:04 localhost python3[6101]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:53:04 localhost python3[6144]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1769151183.7477212-628-215291905243684/source _original_basename=tmpe6ov7gtc follow=False checksum=3cd9da767fb0a14eec4f313122c38d87bc876a69 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:53:10 localhost systemd[1]: session-4.scope: Deactivated successfully. Jan 23 01:53:10 localhost systemd-logind[762]: Session 4 logged out. Waiting for processes to exit. Jan 23 01:53:10 localhost systemd-logind[762]: Removed session 4. Jan 23 01:59:00 localhost sshd[6163]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:59:00 localhost systemd-logind[762]: New session 5 of user zuul. Jan 23 01:59:00 localhost systemd[1]: Started Session 5 of User zuul. Jan 23 01:59:00 localhost python3[6182]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-7446-e1de-000000002191-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:01 localhost python3[6201]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:02 localhost python3[6217]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:02 localhost python3[6233]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:02 localhost python3[6249]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:04 localhost python3[6265]: ansible-ansible.builtin.file Invoked with path=/etc/systemd/system.conf.d state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:04 localhost python3[6313]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system.conf.d/override.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:59:05 localhost python3[6356]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system.conf.d/override.conf mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1769151544.645671-614-279007496733196/source _original_basename=tmpmymw8fyb follow=False checksum=a05098bd3d2321238ea1169d0e6f135b35b392d4 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:06 localhost python3[6386]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Jan 23 01:59:06 localhost systemd[1]: Reloading. Jan 23 01:59:07 localhost systemd-rc-local-generator[6405]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 01:59:07 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 01:59:08 localhost python3[6434]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Jan 23 01:59:09 localhost python3[6450]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:09 localhost python3[6468]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:09 localhost python3[6486]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:10 localhost python3[6504]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:12 localhost python3[6521]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-7446-e1de-000000002198-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:12 localhost python3[6541]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 01:59:15 localhost systemd[1]: session-5.scope: Deactivated successfully. Jan 23 01:59:15 localhost systemd[1]: session-5.scope: Consumed 3.846s CPU time. Jan 23 01:59:15 localhost systemd-logind[762]: Session 5 logged out. Waiting for processes to exit. Jan 23 01:59:15 localhost systemd-logind[762]: Removed session 5. Jan 23 02:00:16 localhost sshd[6548]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:00:16 localhost systemd[1]: Starting Cleanup of Temporary Directories... Jan 23 02:00:16 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Jan 23 02:00:16 localhost systemd[1]: Finished Cleanup of Temporary Directories. Jan 23 02:00:16 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Jan 23 02:00:16 localhost systemd-logind[762]: New session 6 of user zuul. Jan 23 02:00:16 localhost systemd[1]: Started Session 6 of User zuul. Jan 23 02:00:16 localhost systemd[1]: Starting RHSM dbus service... Jan 23 02:00:17 localhost systemd[1]: Started RHSM dbus service. Jan 23 02:00:17 localhost rhsm-service[6575]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:17 localhost rhsm-service[6575]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:17 localhost rhsm-service[6575]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:17 localhost rhsm-service[6575]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:22 localhost rhsm-service[6575]: INFO [subscription_manager.managerlib:90] Consumer created: np0005593102.novalocal (50b82dcf-92cb-4e59-8285-b2a50e8461d9) Jan 23 02:00:22 localhost subscription-manager[6575]: Registered system with identity: 50b82dcf-92cb-4e59-8285-b2a50e8461d9 Jan 23 02:00:28 localhost rhsm-service[6575]: INFO [subscription_manager.entcertlib:131] certs updated: Jan 23 02:00:28 localhost rhsm-service[6575]: Total updates: 1 Jan 23 02:00:28 localhost rhsm-service[6575]: Found (local) serial# [] Jan 23 02:00:28 localhost rhsm-service[6575]: Expected (UEP) serial# [8619446855323929848] Jan 23 02:00:28 localhost rhsm-service[6575]: Added (new) Jan 23 02:00:28 localhost rhsm-service[6575]: [sn:8619446855323929848 ( Content Access,) @ /etc/pki/entitlement/8619446855323929848.pem] Jan 23 02:00:28 localhost rhsm-service[6575]: Deleted (rogue): Jan 23 02:00:28 localhost rhsm-service[6575]: Jan 23 02:00:28 localhost subscription-manager[6575]: Added subscription for 'Content Access' contract 'None' Jan 23 02:00:28 localhost subscription-manager[6575]: Added subscription for product ' Content Access' Jan 23 02:00:35 localhost rhsm-service[6575]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:35 localhost rhsm-service[6575]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:37 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:38 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:39 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:40 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:41 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:50 localhost python3[6666]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-520e-60b7-00000000000d-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:01:01 localhost python3[6700]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:01:32 localhost setsebool[6776]: The virt_use_nfs policy boolean was changed to 1 by root Jan 23 02:01:32 localhost setsebool[6776]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Jan 23 02:01:40 localhost kernel: SELinux: Converting 408 SID table entries... Jan 23 02:01:40 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:01:40 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:01:40 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:01:40 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:01:40 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:01:40 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:01:40 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:01:52 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=3 res=1 Jan 23 02:01:52 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:01:52 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:01:52 localhost systemd[1]: Reloading. Jan 23 02:01:53 localhost systemd-rc-local-generator[7700]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:01:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:01:53 localhost systemd[1]: Starting dnf makecache... Jan 23 02:01:53 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:01:53 localhost dnf[7917]: Updating Subscription Management repositories. Jan 23 02:01:54 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:01:55 localhost dnf[7917]: Failed determining last makecache time. Jan 23 02:01:55 localhost dnf[7917]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 58 kB/s | 4.5 kB 00:00 Jan 23 02:01:55 localhost dnf[7917]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 48 kB/s | 4.1 kB 00:00 Jan 23 02:01:55 localhost dnf[7917]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 51 kB/s | 4.5 kB 00:00 Jan 23 02:01:55 localhost dnf[7917]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 47 kB/s | 4.1 kB 00:00 Jan 23 02:01:56 localhost dnf[7917]: Metadata cache created. Jan 23 02:01:56 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Jan 23 02:01:56 localhost systemd[1]: Finished dnf makecache. Jan 23 02:01:56 localhost systemd[1]: dnf-makecache.service: Consumed 2.649s CPU time. Jan 23 02:01:59 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:01:59 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:01:59 localhost systemd[1]: man-db-cache-update.service: Consumed 8.365s CPU time. Jan 23 02:01:59 localhost systemd[1]: run-r39b6d219c98a4ee7b075e6d163e4b4c0.service: Deactivated successfully. Jan 23 02:02:08 localhost sshd[18357]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:02:48 localhost podman[18374]: 2026-01-23 07:02:48.637948817 +0000 UTC m=+0.088376227 system refresh Jan 23 02:02:49 localhost systemd[4178]: Starting D-Bus User Message Bus... Jan 23 02:02:49 localhost dbus-broker-launch[18430]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Jan 23 02:02:49 localhost dbus-broker-launch[18430]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Jan 23 02:02:49 localhost systemd[4178]: Started D-Bus User Message Bus. Jan 23 02:02:49 localhost journal[18430]: Ready Jan 23 02:02:49 localhost systemd[4178]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Jan 23 02:02:49 localhost systemd[4178]: Created slice Slice /user. Jan 23 02:02:49 localhost systemd[4178]: podman-18414.scope: unit configures an IP firewall, but not running as root. Jan 23 02:02:49 localhost systemd[4178]: (This warning is only shown for the first unit using IP firewalling.) Jan 23 02:02:49 localhost systemd[4178]: Started podman-18414.scope. Jan 23 02:02:49 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 02:02:49 localhost systemd[4178]: Started podman-pause-4487c0b8.scope. Jan 23 02:02:52 localhost systemd[1]: session-6.scope: Deactivated successfully. Jan 23 02:02:52 localhost systemd[1]: session-6.scope: Consumed 49.983s CPU time. Jan 23 02:02:52 localhost systemd-logind[762]: Session 6 logged out. Waiting for processes to exit. Jan 23 02:02:52 localhost systemd-logind[762]: Removed session 6. Jan 23 02:03:07 localhost sshd[18438]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18434]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18436]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18437]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18435]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:14 localhost sshd[18444]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:14 localhost systemd-logind[762]: New session 7 of user zuul. Jan 23 02:03:14 localhost systemd[1]: Started Session 7 of User zuul. Jan 23 02:03:14 localhost python3[18461]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBInV8xbfwZCtixFfnaF+5335WSj2PPYn9+xcf0/XxAeXNy37BWyB6Z08AP77XEzDpqv4jTzIwdAdQ5f/jZPqrA= zuul@np0005593098.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:03:15 localhost python3[18477]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBInV8xbfwZCtixFfnaF+5335WSj2PPYn9+xcf0/XxAeXNy37BWyB6Z08AP77XEzDpqv4jTzIwdAdQ5f/jZPqrA= zuul@np0005593098.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:03:18 localhost systemd[1]: session-7.scope: Deactivated successfully. Jan 23 02:03:18 localhost systemd-logind[762]: Session 7 logged out. Waiting for processes to exit. Jan 23 02:03:18 localhost systemd-logind[762]: Removed session 7. Jan 23 02:04:46 localhost sshd[18479]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:04:47 localhost systemd-logind[762]: New session 8 of user zuul. Jan 23 02:04:47 localhost systemd[1]: Started Session 8 of User zuul. Jan 23 02:04:47 localhost python3[18498]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa 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 zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:04:48 localhost python3[18514]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005593102.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Jan 23 02:04:49 localhost python3[18564]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:49 localhost python3[18607]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769151889.1240118-91-250884559290406/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa follow=False checksum=332ac6e5e102fad0efb63e7711468addf4cebb64 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:51 localhost python3[18669]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:51 localhost python3[18712]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769151891.0609424-182-269370631643159/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa.pub follow=False checksum=a2dfb4df29ea2fda7d7e4b28a63ca08610edd25d backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:54 localhost python3[18742]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:55 localhost python3[18788]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:55 localhost python3[18804]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmp5zp0uta6 recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:56 localhost python3[18864]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:56 localhost python3[18880]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmpmw95wzpp recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:58 localhost python3[18940]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:58 localhost python3[18956]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmpuc7cgbpn recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:59 localhost systemd[1]: session-8.scope: Deactivated successfully. Jan 23 02:04:59 localhost systemd[1]: session-8.scope: Consumed 3.440s CPU time. Jan 23 02:04:59 localhost systemd-logind[762]: Session 8 logged out. Waiting for processes to exit. Jan 23 02:04:59 localhost systemd-logind[762]: Removed session 8. Jan 23 02:07:17 localhost sshd[18973]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:07:17 localhost systemd-logind[762]: New session 9 of user zuul. Jan 23 02:07:17 localhost systemd[1]: Started Session 9 of User zuul. Jan 23 02:07:17 localhost python3[19019]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:11:05 localhost sshd[19021]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:12:17 localhost systemd[1]: session-9.scope: Deactivated successfully. Jan 23 02:12:17 localhost systemd-logind[762]: Session 9 logged out. Waiting for processes to exit. Jan 23 02:12:17 localhost systemd-logind[762]: Removed session 9. Jan 23 02:19:08 localhost sshd[19029]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:19:09 localhost systemd-logind[762]: New session 10 of user zuul. Jan 23 02:19:09 localhost systemd[1]: Started Session 10 of User zuul. Jan 23 02:19:09 localhost python3[19046]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000000c-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:19:10 localhost python3[19066]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000000d-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:19:15 localhost python3[19086]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Jan 23 02:19:18 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:19:18 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:12 localhost python3[19244]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Jan 23 02:20:14 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:22 localhost python3[19384]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Jan 23 02:20:25 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:30 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:30 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:50 localhost python3[19777]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Jan 23 02:20:53 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:53 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:58 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:58 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:20 localhost python3[20172]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Jan 23 02:21:22 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:23 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:27 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:27 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:49 localhost python3[20569]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000013-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:21:55 localhost python3[20588]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:22:14 localhost kernel: SELinux: Converting 488 SID table entries... Jan 23 02:22:14 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:22:14 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:22:16 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=4 res=1 Jan 23 02:22:16 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Jan 23 02:22:18 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:22:18 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:22:18 localhost systemd[1]: Reloading. Jan 23 02:22:19 localhost systemd-sysv-generator[21261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:22:19 localhost systemd-rc-local-generator[21252]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:22:19 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:22:19 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:22:20 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:22:20 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:22:20 localhost systemd[1]: run-r1fd35b73d8e94dc2b8b9a0e6005e0408.service: Deactivated successfully. Jan 23 02:22:20 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:22:20 localhost rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:22:47 localhost python3[21797]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000015-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:23:15 localhost python3[21817]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:23:15 localhost python3[21865]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:23:16 localhost python3[21908]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769152995.5839496-287-156853858966392/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=c4aca9aeb86d5a72911d87567aeb8f7976c3c1f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:23:17 localhost python3[21938]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:17 localhost systemd-journald[617]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 89.2 (297 of 333 items), suggesting rotation. Jan 23 02:23:17 localhost systemd-journald[617]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 02:23:17 localhost rsyslogd[760]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:23:17 localhost rsyslogd[760]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:23:18 localhost python3[21959]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:18 localhost python3[21979]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:18 localhost python3[21999]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:18 localhost python3[22019]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:21 localhost python3[22040]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 02:23:21 localhost systemd[1]: Starting LSB: Bring up/down networking... Jan 23 02:23:21 localhost network[22043]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Jan 23 02:23:21 localhost network[22054]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Jan 23 02:23:21 localhost network[22043]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:21 localhost network[22055]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:21 localhost network[22043]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Jan 23 02:23:21 localhost network[22056]: It is advised to switch to 'NetworkManager' instead for network management. Jan 23 02:23:21 localhost NetworkManager[5962]: [1769153001.4265] audit: op="connections-reload" pid=22084 uid=0 result="success" Jan 23 02:23:21 localhost network[22043]: Bringing up loopback interface: [ OK ] Jan 23 02:23:21 localhost NetworkManager[5962]: [1769153001.6423] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=22172 uid=0 result="success" Jan 23 02:23:21 localhost network[22043]: Bringing up interface eth0: [ OK ] Jan 23 02:23:21 localhost systemd[1]: Started LSB: Bring up/down networking. Jan 23 02:23:22 localhost python3[22213]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch Database Unit... Jan 23 02:23:22 localhost chown[22217]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Jan 23 02:23:22 localhost ovs-ctl[22222]: /etc/openvswitch/conf.db does not exist ... (warning). Jan 23 02:23:22 localhost ovs-ctl[22222]: Creating empty database /etc/openvswitch/conf.db [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22222]: Starting ovsdb-server [ OK ] Jan 23 02:23:22 localhost ovs-vsctl[22272]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Jan 23 02:23:22 localhost ovs-vsctl[22292]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.6-141.el9fdp "external-ids:system-id=\"0ee131da-6757-426a-8608-c47201e222a2\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Jan 23 02:23:22 localhost ovs-ctl[22222]: Configuring Open vSwitch system IDs [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22222]: Enabling remote OVSDB managers [ OK ] Jan 23 02:23:22 localhost systemd[1]: Started Open vSwitch Database Unit. Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Jan 23 02:23:22 localhost ovs-vsctl[22298]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005593102.novalocal Jan 23 02:23:22 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Jan 23 02:23:22 localhost kernel: openvswitch: Open vSwitch switching datapath Jan 23 02:23:22 localhost ovs-ctl[22342]: Inserting openvswitch module [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22311]: Starting ovs-vswitchd [ OK ] Jan 23 02:23:22 localhost ovs-vsctl[22360]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005593102.novalocal Jan 23 02:23:22 localhost ovs-ctl[22311]: Enabling remote OVSDB managers [ OK ] Jan 23 02:23:22 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch... Jan 23 02:23:22 localhost systemd[1]: Finished Open vSwitch. Jan 23 02:23:26 localhost python3[22378]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000001a-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:23:26 localhost NetworkManager[5962]: [1769153006.9217] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22536 uid=0 result="success" Jan 23 02:23:26 localhost ifup[22537]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:26 localhost ifup[22538]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:26 localhost ifup[22539]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:26 localhost NetworkManager[5962]: [1769153006.9560] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22545 uid=0 result="success" Jan 23 02:23:26 localhost ovs-vsctl[22547]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:0b:ac:5c -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Jan 23 02:23:26 localhost kernel: device ovs-system entered promiscuous mode Jan 23 02:23:26 localhost NetworkManager[5962]: [1769153006.9862] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Jan 23 02:23:26 localhost systemd-udevd[22549]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:26 localhost kernel: Timeout policy base is empty Jan 23 02:23:26 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Jan 23 02:23:27 localhost systemd-udevd[22564]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:27 localhost kernel: device br-ex entered promiscuous mode Jan 23 02:23:27 localhost NetworkManager[5962]: [1769153007.0274] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Jan 23 02:23:27 localhost NetworkManager[5962]: [1769153007.0854] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22574 uid=0 result="success" Jan 23 02:23:27 localhost NetworkManager[5962]: [1769153007.1025] device (br-ex): carrier: link connected Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.1532] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22603 uid=0 result="success" Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.2029] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22618 uid=0 result="success" Jan 23 02:23:30 localhost NET[22643]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.2927] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.3067] dhcp4 (eth1): canceled DHCP transaction Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.3067] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.3067] dhcp4 (eth1): state changed no lease Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.3115] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22652 uid=0 result="success" Jan 23 02:23:30 localhost ifup[22653]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:30 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 02:23:30 localhost ifup[22654]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:30 localhost ifup[22656]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:30 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.3461] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22668 uid=0 result="success" Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.3930] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22680 uid=0 result="success" Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.3995] device (eth1): carrier: link connected Jan 23 02:23:30 localhost NetworkManager[5962]: [1769153010.4230] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22689 uid=0 result="success" Jan 23 02:23:30 localhost ipv6_wait_tentative[22701]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Jan 23 02:23:31 localhost ipv6_wait_tentative[22706]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Jan 23 02:23:32 localhost NetworkManager[5962]: [1769153012.4877] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22715 uid=0 result="success" Jan 23 02:23:32 localhost ovs-vsctl[22730]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Jan 23 02:23:32 localhost kernel: device eth1 entered promiscuous mode Jan 23 02:23:32 localhost NetworkManager[5962]: [1769153012.5609] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22738 uid=0 result="success" Jan 23 02:23:32 localhost ifup[22739]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:32 localhost ifup[22740]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:32 localhost ifup[22741]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:32 localhost NetworkManager[5962]: [1769153012.5933] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22747 uid=0 result="success" Jan 23 02:23:32 localhost NetworkManager[5962]: [1769153012.6347] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22757 uid=0 result="success" Jan 23 02:23:32 localhost ifup[22758]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:32 localhost ifup[22759]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:32 localhost ifup[22760]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:32 localhost NetworkManager[5962]: [1769153012.6675] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22766 uid=0 result="success" Jan 23 02:23:32 localhost ovs-vsctl[22769]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Jan 23 02:23:32 localhost kernel: device vlan23 entered promiscuous mode Jan 23 02:23:32 localhost NetworkManager[5962]: [1769153012.7125] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Jan 23 02:23:32 localhost systemd-udevd[22771]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:32 localhost NetworkManager[5962]: [1769153012.7404] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22780 uid=0 result="success" Jan 23 02:23:32 localhost NetworkManager[5962]: [1769153012.7609] device (vlan23): carrier: link connected Jan 23 02:23:35 localhost NetworkManager[5962]: [1769153015.8148] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22809 uid=0 result="success" Jan 23 02:23:35 localhost NetworkManager[5962]: [1769153015.8601] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22824 uid=0 result="success" Jan 23 02:23:35 localhost NetworkManager[5962]: [1769153015.9183] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22845 uid=0 result="success" Jan 23 02:23:35 localhost ifup[22846]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:35 localhost ifup[22847]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:35 localhost ifup[22848]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:35 localhost NetworkManager[5962]: [1769153015.9496] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22854 uid=0 result="success" Jan 23 02:23:35 localhost ovs-vsctl[22857]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Jan 23 02:23:35 localhost kernel: device vlan20 entered promiscuous mode Jan 23 02:23:35 localhost NetworkManager[5962]: [1769153015.9860] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Jan 23 02:23:35 localhost systemd-udevd[22859]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:36 localhost NetworkManager[5962]: [1769153016.0139] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22869 uid=0 result="success" Jan 23 02:23:36 localhost NetworkManager[5962]: [1769153016.0346] device (vlan20): carrier: link connected Jan 23 02:23:39 localhost NetworkManager[5962]: [1769153019.0830] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22900 uid=0 result="success" Jan 23 02:23:39 localhost NetworkManager[5962]: [1769153019.1280] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22915 uid=0 result="success" Jan 23 02:23:39 localhost NetworkManager[5962]: [1769153019.1903] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22936 uid=0 result="success" Jan 23 02:23:39 localhost ifup[22937]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:39 localhost ifup[22938]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:39 localhost ifup[22939]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:39 localhost NetworkManager[5962]: [1769153019.2224] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22945 uid=0 result="success" Jan 23 02:23:39 localhost ovs-vsctl[22948]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Jan 23 02:23:39 localhost NetworkManager[5962]: [1769153019.2574] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Jan 23 02:23:39 localhost kernel: device vlan22 entered promiscuous mode Jan 23 02:23:39 localhost systemd-udevd[22950]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:39 localhost NetworkManager[5962]: [1769153019.2841] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22960 uid=0 result="success" Jan 23 02:23:39 localhost NetworkManager[5962]: [1769153019.3042] device (vlan22): carrier: link connected Jan 23 02:23:40 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 02:23:42 localhost NetworkManager[5962]: [1769153022.3628] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22991 uid=0 result="success" Jan 23 02:23:42 localhost NetworkManager[5962]: [1769153022.4110] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23006 uid=0 result="success" Jan 23 02:23:42 localhost NetworkManager[5962]: [1769153022.4683] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23027 uid=0 result="success" Jan 23 02:23:42 localhost ifup[23028]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:42 localhost ifup[23029]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:42 localhost ifup[23030]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:42 localhost NetworkManager[5962]: [1769153022.4977] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23036 uid=0 result="success" Jan 23 02:23:42 localhost ovs-vsctl[23039]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Jan 23 02:23:42 localhost kernel: device vlan44 entered promiscuous mode Jan 23 02:23:42 localhost NetworkManager[5962]: [1769153022.5312] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Jan 23 02:23:42 localhost systemd-udevd[23041]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:42 localhost NetworkManager[5962]: [1769153022.5580] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23051 uid=0 result="success" Jan 23 02:23:42 localhost NetworkManager[5962]: [1769153022.5752] device (vlan44): carrier: link connected Jan 23 02:23:45 localhost NetworkManager[5962]: [1769153025.6197] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23081 uid=0 result="success" Jan 23 02:23:45 localhost NetworkManager[5962]: [1769153025.6639] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23096 uid=0 result="success" Jan 23 02:23:45 localhost NetworkManager[5962]: [1769153025.7157] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23117 uid=0 result="success" Jan 23 02:23:45 localhost ifup[23118]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:45 localhost ifup[23119]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:45 localhost ifup[23120]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:45 localhost NetworkManager[5962]: [1769153025.7459] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23126 uid=0 result="success" Jan 23 02:23:45 localhost ovs-vsctl[23129]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Jan 23 02:23:45 localhost systemd-udevd[23131]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:45 localhost kernel: device vlan21 entered promiscuous mode Jan 23 02:23:45 localhost NetworkManager[5962]: [1769153025.7836] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Jan 23 02:23:45 localhost NetworkManager[5962]: [1769153025.8076] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23141 uid=0 result="success" Jan 23 02:23:45 localhost NetworkManager[5962]: [1769153025.8273] device (vlan21): carrier: link connected Jan 23 02:23:48 localhost NetworkManager[5962]: [1769153028.8729] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23171 uid=0 result="success" Jan 23 02:23:48 localhost NetworkManager[5962]: [1769153028.9145] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23186 uid=0 result="success" Jan 23 02:23:48 localhost NetworkManager[5962]: [1769153028.9662] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23207 uid=0 result="success" Jan 23 02:23:48 localhost ifup[23208]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:48 localhost ifup[23209]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:48 localhost ifup[23210]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:48 localhost NetworkManager[5962]: [1769153028.9914] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23216 uid=0 result="success" Jan 23 02:23:49 localhost ovs-vsctl[23219]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Jan 23 02:23:49 localhost NetworkManager[5962]: [1769153029.0467] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23226 uid=0 result="success" Jan 23 02:23:50 localhost NetworkManager[5962]: [1769153030.1073] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23253 uid=0 result="success" Jan 23 02:23:50 localhost NetworkManager[5962]: [1769153030.1509] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23268 uid=0 result="success" Jan 23 02:23:50 localhost NetworkManager[5962]: [1769153030.1999] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23289 uid=0 result="success" Jan 23 02:23:50 localhost ifup[23290]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:50 localhost ifup[23291]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:50 localhost ifup[23292]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:50 localhost NetworkManager[5962]: [1769153030.2350] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23298 uid=0 result="success" Jan 23 02:23:50 localhost ovs-vsctl[23301]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Jan 23 02:23:50 localhost NetworkManager[5962]: [1769153030.2879] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23308 uid=0 result="success" Jan 23 02:23:51 localhost NetworkManager[5962]: [1769153031.3451] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23336 uid=0 result="success" Jan 23 02:23:51 localhost NetworkManager[5962]: [1769153031.3927] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23351 uid=0 result="success" Jan 23 02:23:51 localhost NetworkManager[5962]: [1769153031.4463] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23372 uid=0 result="success" Jan 23 02:23:51 localhost ifup[23373]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:51 localhost ifup[23374]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:51 localhost ifup[23375]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:51 localhost NetworkManager[5962]: [1769153031.4803] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23381 uid=0 result="success" Jan 23 02:23:51 localhost ovs-vsctl[23384]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Jan 23 02:23:51 localhost NetworkManager[5962]: [1769153031.5414] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23391 uid=0 result="success" Jan 23 02:23:52 localhost NetworkManager[5962]: [1769153032.5997] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23419 uid=0 result="success" Jan 23 02:23:52 localhost NetworkManager[5962]: [1769153032.6447] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23434 uid=0 result="success" Jan 23 02:23:52 localhost NetworkManager[5962]: [1769153032.7021] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23455 uid=0 result="success" Jan 23 02:23:52 localhost ifup[23456]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:52 localhost ifup[23457]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:52 localhost ifup[23458]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:52 localhost NetworkManager[5962]: [1769153032.7324] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23464 uid=0 result="success" Jan 23 02:23:52 localhost ovs-vsctl[23467]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Jan 23 02:23:52 localhost NetworkManager[5962]: [1769153032.7880] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23474 uid=0 result="success" Jan 23 02:23:53 localhost NetworkManager[5962]: [1769153033.8483] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23502 uid=0 result="success" Jan 23 02:23:53 localhost NetworkManager[5962]: [1769153033.8946] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23517 uid=0 result="success" Jan 23 02:23:53 localhost NetworkManager[5962]: [1769153033.9543] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23538 uid=0 result="success" Jan 23 02:23:53 localhost ifup[23539]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:53 localhost ifup[23540]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:53 localhost ifup[23541]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:53 localhost NetworkManager[5962]: [1769153033.9865] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23547 uid=0 result="success" Jan 23 02:23:54 localhost ovs-vsctl[23550]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Jan 23 02:23:54 localhost NetworkManager[5962]: [1769153034.0428] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23557 uid=0 result="success" Jan 23 02:23:55 localhost NetworkManager[5962]: [1769153035.0984] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23585 uid=0 result="success" Jan 23 02:23:55 localhost NetworkManager[5962]: [1769153035.1447] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23600 uid=0 result="success" Jan 23 02:24:48 localhost python3[23632]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000001b-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:24:53 localhost python3[23651]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:54 localhost python3[23667]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:56 localhost python3[23681]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:56 localhost python3[23697]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:57 localhost python3[23711]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Jan 23 02:24:58 localhost python3[23726]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005593102.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000022-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:24:59 localhost python3[23746]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000023-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:24:59 localhost systemd[1]: Starting Hostname Service... Jan 23 02:24:59 localhost systemd[1]: Started Hostname Service. Jan 23 02:24:59 localhost systemd-hostnamed[23750]: Hostname set to (static) Jan 23 02:24:59 localhost NetworkManager[5962]: [1769153099.0840] hostname: static hostname changed from "np0005593102.novalocal" to "np0005593102.ooo.test" Jan 23 02:24:59 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 02:24:59 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 02:25:00 localhost systemd[1]: session-10.scope: Deactivated successfully. Jan 23 02:25:00 localhost systemd[1]: session-10.scope: Consumed 1min 44.723s CPU time. Jan 23 02:25:00 localhost systemd-logind[762]: Session 10 logged out. Waiting for processes to exit. Jan 23 02:25:00 localhost systemd-logind[762]: Removed session 10. Jan 23 02:25:02 localhost sshd[23761]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:25:02 localhost systemd-logind[762]: New session 11 of user zuul. Jan 23 02:25:02 localhost systemd[1]: Started Session 11 of User zuul. Jan 23 02:25:02 localhost python3[23778]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Jan 23 02:25:05 localhost systemd[1]: session-11.scope: Deactivated successfully. Jan 23 02:25:05 localhost systemd-logind[762]: Session 11 logged out. Waiting for processes to exit. Jan 23 02:25:05 localhost systemd-logind[762]: Removed session 11. Jan 23 02:25:09 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 02:25:29 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 02:25:30 localhost sshd[23783]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:25:30 localhost systemd-logind[762]: New session 12 of user zuul. Jan 23 02:25:30 localhost systemd[1]: Started Session 12 of User zuul. Jan 23 02:25:31 localhost python3[23802]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:25:39 localhost dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Jan 23 02:25:39 localhost dbus-broker-launch[18430]: Noticed file-system modification, trigger reload. Jan 23 02:25:39 localhost dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Jan 23 02:25:39 localhost dbus-broker-launch[18430]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Jan 23 02:25:39 localhost dbus-broker-launch[18430]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Jan 23 02:25:39 localhost dbus-broker-launch[18430]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Jan 23 02:25:39 localhost systemd[1]: Reloading. Jan 23 02:25:39 localhost systemd-rc-local-generator[23901]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:25:39 localhost systemd-sysv-generator[23905]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:25:39 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:25:39 localhost dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Jan 23 02:25:48 localhost kernel: SELinux: Converting 538 SID table entries... Jan 23 02:25:48 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:25:48 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:25:48 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:25:48 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:25:48 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:25:48 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:25:48 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:25:49 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=5 res=1 Jan 23 02:25:49 localhost systemd[1]: Stopping OpenSSH server daemon... Jan 23 02:25:49 localhost systemd[1]: sshd.service: Deactivated successfully. Jan 23 02:25:49 localhost systemd[1]: Stopped OpenSSH server daemon. Jan 23 02:25:49 localhost systemd[1]: sshd.service: Consumed 1.048s CPU time. Jan 23 02:25:49 localhost systemd[1]: Stopped target sshd-keygen.target. Jan 23 02:25:49 localhost systemd[1]: Stopping sshd-keygen.target... Jan 23 02:25:49 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 02:25:49 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 02:25:49 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 02:25:49 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 02:25:49 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 02:25:49 localhost sshd[23939]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:25:49 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 02:25:50 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:25:50 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:25:50 localhost systemd[1]: Reloading. Jan 23 02:25:50 localhost systemd-sysv-generator[24491]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:25:50 localhost systemd-rc-local-generator[24485]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:25:50 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:25:50 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:25:50 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:25:51 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:25:51 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:25:51 localhost systemd[1]: man-db-cache-update.service: Consumed 1.281s CPU time. Jan 23 02:25:51 localhost systemd[1]: run-r5b87f0f496584a9dbb06a78d81ac68c5.service: Deactivated successfully. Jan 23 02:25:51 localhost systemd[1]: run-rccd0ffe503484543b12149b931e01215.service: Deactivated successfully. Jan 23 02:26:51 localhost systemd[1]: session-12.scope: Deactivated successfully. Jan 23 02:26:51 localhost systemd[1]: session-12.scope: Consumed 17.397s CPU time. Jan 23 02:26:51 localhost systemd-logind[762]: Session 12 logged out. Waiting for processes to exit. Jan 23 02:26:51 localhost systemd-logind[762]: Removed session 12. Jan 23 02:27:41 localhost sshd[25903]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:27:41 localhost systemd[1]: Started Session 13 of User zuul. Jan 23 02:27:41 localhost systemd-logind[762]: New session 13 of user zuul. Jan 23 02:27:42 localhost python3[25954]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:27:42 localhost python3[25999]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769153261.8936853-62-97605949053156/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:27:46 localhost python3[26029]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:27:48 localhost python3[26047]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:28:49 localhost systemd[1]: session-13.scope: Deactivated successfully. Jan 23 02:28:49 localhost systemd[1]: session-13.scope: Consumed 1.182s CPU time. Jan 23 02:28:49 localhost systemd-logind[762]: Session 13 logged out. Waiting for processes to exit. Jan 23 02:28:49 localhost systemd-logind[762]: Removed session 13. Jan 23 02:50:24 localhost sshd[26056]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:50:24 localhost sshd[26057]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:51:44 localhost sshd[26061]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:55:17 localhost sshd[26064]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:55:55 localhost sshd[26066]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:55:56 localhost systemd-logind[762]: New session 14 of user zuul. Jan 23 02:55:56 localhost systemd[1]: Started Session 14 of User zuul. Jan 23 02:55:56 localhost python3[26114]: ansible-ansible.legacy.ping Invoked with data=pong Jan 23 02:55:57 localhost python3[26159]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 02:55:57 localhost python3[26179]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005593102.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Jan 23 02:55:58 localhost systemd-journald[617]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Jan 23 02:55:58 localhost systemd-journald[617]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 02:55:58 localhost rsyslogd[760]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:55:58 localhost rsyslogd[760]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:55:58 localhost python3[26237]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:55:59 localhost python3[26280]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1769154958.406071-81435-224690149876821/source _original_basename=tmpoqyvq0la follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:55:59 localhost python3[26310]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:00 localhost python3[26326]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:01 localhost python3[26342]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:01 localhost python3[26358]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa 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 zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:02 localhost python3[26372]: ansible-ping Invoked with data=pong Jan 23 02:56:13 localhost sshd[26374]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:56:13 localhost systemd-logind[762]: New session 15 of user tripleo-admin. Jan 23 02:56:13 localhost systemd[1]: Created slice User Slice of UID 1002. Jan 23 02:56:13 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Jan 23 02:56:13 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Jan 23 02:56:13 localhost systemd[1]: Starting User Manager for UID 1002... Jan 23 02:56:13 localhost systemd[26378]: Queued start job for default target Main User Target. Jan 23 02:56:13 localhost systemd[26378]: Created slice User Application Slice. Jan 23 02:56:13 localhost systemd[26378]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 02:56:13 localhost systemd[26378]: Started Daily Cleanup of User's Temporary Directories. Jan 23 02:56:13 localhost systemd[26378]: Reached target Paths. Jan 23 02:56:13 localhost systemd[26378]: Reached target Timers. Jan 23 02:56:13 localhost systemd[26378]: Starting D-Bus User Message Bus Socket... Jan 23 02:56:13 localhost systemd[26378]: Starting Create User's Volatile Files and Directories... Jan 23 02:56:13 localhost systemd[26378]: Listening on D-Bus User Message Bus Socket. Jan 23 02:56:13 localhost systemd[26378]: Reached target Sockets. Jan 23 02:56:13 localhost systemd[26378]: Finished Create User's Volatile Files and Directories. Jan 23 02:56:13 localhost systemd[26378]: Reached target Basic System. Jan 23 02:56:13 localhost systemd[26378]: Reached target Main User Target. Jan 23 02:56:13 localhost systemd[26378]: Startup finished in 97ms. Jan 23 02:56:13 localhost systemd[1]: Started User Manager for UID 1002. Jan 23 02:56:13 localhost systemd[1]: Started Session 15 of User tripleo-admin. Jan 23 02:56:14 localhost python3[26439]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Jan 23 02:56:18 localhost python3[26459]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Jan 23 02:56:19 localhost python3[26475]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Jan 23 02:56:20 localhost python3[26523]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.9fgexo15tmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:20 localhost python3[26553]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.9fgexo15tmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:21 localhost python3[26569]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.9fgexo15tmphosts insertbefore=BOF block=172.17.0.106 np0005593104.ooo.test np0005593104#012172.18.0.106 np0005593104.storage.ooo.test np0005593104.storage#012172.17.0.106 np0005593104.internalapi.ooo.test np0005593104.internalapi#012172.19.0.106 np0005593104.tenant.ooo.test np0005593104.tenant#012192.168.122.106 np0005593104.ctlplane.ooo.test np0005593104.ctlplane#012172.17.0.107 np0005593105.ooo.test np0005593105#012172.18.0.107 np0005593105.storage.ooo.test np0005593105.storage#012172.17.0.107 np0005593105.internalapi.ooo.test np0005593105.internalapi#012172.19.0.107 np0005593105.tenant.ooo.test np0005593105.tenant#012192.168.122.107 np0005593105.ctlplane.ooo.test np0005593105.ctlplane#012172.17.0.108 np0005593106.ooo.test np0005593106#012172.18.0.108 np0005593106.storage.ooo.test np0005593106.storage#012172.17.0.108 np0005593106.internalapi.ooo.test np0005593106.internalapi#012172.19.0.108 np0005593106.tenant.ooo.test np0005593106.tenant#012192.168.122.108 np0005593106.ctlplane.ooo.test np0005593106.ctlplane#012172.17.0.103 np0005593101.ooo.test np0005593101#012172.18.0.103 np0005593101.storage.ooo.test np0005593101.storage#012172.20.0.103 np0005593101.storagemgmt.ooo.test np0005593101.storagemgmt#012172.17.0.103 np0005593101.internalapi.ooo.test np0005593101.internalapi#012172.19.0.103 np0005593101.tenant.ooo.test np0005593101.tenant#012172.21.0.103 np0005593101.external.ooo.test np0005593101.external#012192.168.122.103 np0005593101.ctlplane.ooo.test np0005593101.ctlplane#012172.17.0.104 np0005593102.ooo.test np0005593102#012172.18.0.104 np0005593102.storage.ooo.test np0005593102.storage#012172.20.0.104 np0005593102.storagemgmt.ooo.test np0005593102.storagemgmt#012172.17.0.104 np0005593102.internalapi.ooo.test np0005593102.internalapi#012172.19.0.104 np0005593102.tenant.ooo.test np0005593102.tenant#012172.21.0.104 np0005593102.external.ooo.test np0005593102.external#012192.168.122.104 np0005593102.ctlplane.ooo.test np0005593102.ctlplane#012172.17.0.105 np0005593103.ooo.test np0005593103#012172.18.0.105 np0005593103.storage.ooo.test np0005593103.storage#012172.20.0.105 np0005593103.storagemgmt.ooo.test np0005593103.storagemgmt#012172.17.0.105 np0005593103.internalapi.ooo.test np0005593103.internalapi#012172.19.0.105 np0005593103.tenant.ooo.test np0005593103.tenant#012172.21.0.105 np0005593103.external.ooo.test np0005593103.external#012192.168.122.105 np0005593103.ctlplane.ooo.test np0005593103.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.238 overcloud.storage.ooo.test#012172.20.0.139 overcloud.storagemgmt.ooo.test#012172.17.0.233 overcloud.internalapi.ooo.test#012172.21.0.174 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:22 localhost python3[26585]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.9fgexo15tmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:56:22 localhost python3[26602]: ansible-file Invoked with path=/tmp/ansible.9fgexo15tmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:23 localhost python3[26618]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:56:24 localhost python3[26635]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:56:28 localhost python3[26654]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:56:29 localhost python3[26671]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:56:44 localhost systemd[1]: Reloading. Jan 23 02:56:44 localhost systemd-rc-local-generator[26866]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:56:44 localhost systemd-sysv-generator[26869]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:56:44 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:56:44 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Jan 23 02:56:53 localhost systemd[1]: Reloading. Jan 23 02:56:53 localhost systemd-rc-local-generator[26935]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:56:53 localhost systemd-sysv-generator[26940]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:56:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:56:53 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Jan 23 02:56:53 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Jan 23 02:56:53 localhost systemd[1]: Reloading. Jan 23 02:56:53 localhost systemd-rc-local-generator[26974]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:56:53 localhost systemd-sysv-generator[26977]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:56:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:56:53 localhost systemd[1]: Listening on LVM2 poll daemon socket. Jan 23 02:57:07 localhost sshd[27490]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:57:42 localhost kernel: SELinux: Converting 2713 SID table entries... Jan 23 02:57:42 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:57:42 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:57:43 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=7 res=1 Jan 23 02:57:43 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:57:43 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:57:43 localhost systemd[1]: Reloading. Jan 23 02:57:43 localhost systemd-rc-local-generator[27753]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:57:43 localhost systemd-sysv-generator[27756]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:57:43 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:57:43 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:57:43 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:57:44 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:57:44 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:57:44 localhost systemd[1]: run-r8dcefdbab6d941828ae9adaa2c22b335.service: Deactivated successfully. Jan 23 02:57:44 localhost systemd[1]: run-r1da074e7bf594516ac8da4b04d133f78.service: Deactivated successfully. Jan 23 02:57:47 localhost python3[28648]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:49 localhost python3[28787]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 02:57:49 localhost systemd[1]: Reloading. Jan 23 02:57:49 localhost systemd-rc-local-generator[28813]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:57:49 localhost systemd-sysv-generator[28819]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:57:49 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:57:49 localhost python3[28841]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:50 localhost python3[28857]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:51 localhost python3[28874]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Jan 23 02:57:51 localhost python3[28892]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:51 localhost python3[28910]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:52 localhost python3[28928]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 02:57:52 localhost systemd[1]: Reloading Network Manager... Jan 23 02:57:52 localhost NetworkManager[5962]: [1769155072.5908] audit: op="reload" arg="0" pid=28931 uid=0 result="success" Jan 23 02:57:52 localhost NetworkManager[5962]: [1769155072.5918] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Jan 23 02:57:52 localhost NetworkManager[5962]: [1769155072.5918] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Jan 23 02:57:52 localhost systemd[1]: Reloaded Network Manager. Jan 23 02:57:52 localhost python3[28947]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:53 localhost python3[28964]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:57:53 localhost python3[28982]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:57:54 localhost python3[28998]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:55 localhost python3[29014]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Jan 23 02:57:55 localhost python3[29030]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:57:56 localhost python3[29046]: ansible-blockinfile Invoked with path=/tmp/ansible.690opqrn block=[192.168.122.106]*,[np0005593104.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005593104.internalapi.ooo.test]*,[172.18.0.106]*,[np0005593104.storage.ooo.test]*,[172.19.0.106]*,[np0005593104.tenant.ooo.test]*,[np0005593104.ooo.test]*,[np0005593104]* ssh-rsa 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#012[192.168.122.107]*,[np0005593105.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005593105.internalapi.ooo.test]*,[172.18.0.107]*,[np0005593105.storage.ooo.test]*,[172.19.0.107]*,[np0005593105.tenant.ooo.test]*,[np0005593105.ooo.test]*,[np0005593105]* ssh-rsa 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#012[192.168.122.108]*,[np0005593106.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005593106.internalapi.ooo.test]*,[172.18.0.108]*,[np0005593106.storage.ooo.test]*,[172.19.0.108]*,[np0005593106.tenant.ooo.test]*,[np0005593106.ooo.test]*,[np0005593106]* ssh-rsa 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#012[192.168.122.103]*,[np0005593101.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005593101.external.ooo.test]*,[172.17.0.103]*,[np0005593101.internalapi.ooo.test]*,[172.18.0.103]*,[np0005593101.storage.ooo.test]*,[172.20.0.103]*,[np0005593101.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005593101.tenant.ooo.test]*,[np0005593101.ooo.test]*,[np0005593101]* ssh-rsa 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#012[192.168.122.104]*,[np0005593102.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005593102.external.ooo.test]*,[172.17.0.104]*,[np0005593102.internalapi.ooo.test]*,[172.18.0.104]*,[np0005593102.storage.ooo.test]*,[172.20.0.104]*,[np0005593102.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005593102.tenant.ooo.test]*,[np0005593102.ooo.test]*,[np0005593102]* ssh-rsa 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#012[192.168.122.105]*,[np0005593103.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005593103.external.ooo.test]*,[172.17.0.105]*,[np0005593103.internalapi.ooo.test]*,[172.18.0.105]*,[np0005593103.storage.ooo.test]*,[172.20.0.105]*,[np0005593103.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005593103.tenant.ooo.test]*,[np0005593103.ooo.test]*,[np0005593103]* ssh-rsa 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#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:56 localhost python3[29062]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.690opqrn' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:57 localhost python3[29080]: ansible-file Invoked with path=/tmp/ansible.690opqrn state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:57 localhost python3[29096]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Jan 23 02:57:58 localhost python3[29112]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:58 localhost python3[29130]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:59 localhost python3[29149]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Jan 23 02:58:01 localhost python3[29286]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:02 localhost python3[29303]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:58:06 localhost dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Jan 23 02:58:06 localhost dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Jan 23 02:58:06 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:58:06 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:58:06 localhost systemd[1]: Reloading. Jan 23 02:58:06 localhost systemd-rc-local-generator[29357]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:58:06 localhost systemd-sysv-generator[29361]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:58:06 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:58:06 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:58:06 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Jan 23 02:58:06 localhost systemd[1]: tuned.service: Deactivated successfully. Jan 23 02:58:06 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Jan 23 02:58:06 localhost systemd[1]: tuned.service: Consumed 1.614s CPU time. Jan 23 02:58:06 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Jan 23 02:58:06 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:58:06 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:58:06 localhost systemd[1]: run-r0e85d6717e0a44f7a0758a693c8b1c3a.service: Deactivated successfully. Jan 23 02:58:08 localhost systemd[1]: Started Dynamic System Tuning Daemon. Jan 23 02:58:08 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:58:08 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:58:08 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:58:08 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:58:08 localhost systemd[1]: run-raf9b8513be1a4d46ad42de7be0799136.service: Deactivated successfully. Jan 23 02:58:09 localhost python3[29748]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 02:58:09 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Jan 23 02:58:09 localhost systemd[1]: tuned.service: Deactivated successfully. Jan 23 02:58:09 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Jan 23 02:58:09 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Jan 23 02:58:10 localhost systemd[1]: Started Dynamic System Tuning Daemon. Jan 23 02:58:11 localhost python3[29943]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:12 localhost python3[29960]: ansible-slurp Invoked with src=/etc/tuned/active_profile Jan 23 02:58:12 localhost python3[29976]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:58:12 localhost python3[29992]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:14 localhost python3[30012]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:14 localhost python3[30029]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:58:18 localhost python3[30045]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:22 localhost python3[30061]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:22 localhost python3[30109]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:23 localhost python3[30154]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155102.636563-86935-85087300656239/source _original_basename=tmpkz6wubpo follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:23 localhost python3[30184]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:24 localhost python3[30232]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:24 localhost python3[30275]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155104.1733475-87132-15727645270711/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=4c6f6f1e157c95c018a9a3fc557f58bca6ba52ee backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:25 localhost python3[30337]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:25 localhost python3[30380]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155105.1050804-87287-228342873678210/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=47e9dc10400b5a5894a9784d46950858e4030f13 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:26 localhost python3[30442]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:26 localhost python3[30485]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155106.032809-87287-235752847302093/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=86b198682757f39396e7e285c6c5807167ea1f96 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:27 localhost python3[30547]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:28 localhost python3[30590]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155107.0328138-87287-23179706474894/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=3aa9bde21cec8e8062cc87ae410eab47ae478aa8 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:28 localhost python3[30652]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:28 localhost python3[30695]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155108.2048416-87287-134663275542824/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:29 localhost python3[30757]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:29 localhost python3[30800]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155109.1645586-87287-36170981543737/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=ecff155c4f39b079c412aee7ef2a8efce88fe128 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:30 localhost python3[30862]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:30 localhost python3[30905]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155110.1344845-87287-201946214093767/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:31 localhost python3[30967]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:31 localhost python3[31010]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155111.0904822-87287-44624685068057/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=bc03d746e245e4d09238f3af0e483f473d83fd3a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:32 localhost python3[31072]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:32 localhost python3[31115]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155112.0754304-87287-259359143141989/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:33 localhost python3[31177]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:33 localhost python3[31220]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155113.0900874-87287-193377359590940/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:34 localhost python3[31282]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:34 localhost python3[31325]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155114.0121953-87287-30301806488377/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=b7f7b74311c07a3990cc34ce8aa6ae3b5e966939 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:35 localhost python3[31355]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:58:36 localhost python3[31403]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:36 localhost python3[31446]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155115.7456007-88799-14471495292204/source _original_basename=tmpt6zao_u8 follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:41 localhost python3[31476]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Jan 23 02:58:41 localhost python3[31537]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:46 localhost python3[31554]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:51 localhost python3[31571]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:51 localhost python3[31594]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:56 localhost python3[31611]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:56 localhost python3[31634]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:57 localhost systemd[26378]: Starting Mark boot as successful... Jan 23 02:58:57 localhost systemd[26378]: Finished Mark boot as successful. Jan 23 02:58:59 localhost sshd[31637]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:59:01 localhost python3[31654]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:05 localhost python3[31671]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:06 localhost python3[31694]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:10 localhost python3[31711]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:15 localhost python3[31728]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:15 localhost python3[31751]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:20 localhost python3[31768]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:24 localhost python3[31785]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:25 localhost python3[31808]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:29 localhost python3[31825]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:34 localhost python3[31842]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:34 localhost python3[31865]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:39 localhost python3[31882]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:44 localhost python3[31899]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:44 localhost python3[31947]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:45 localhost python3[31965]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmpqgrfoil0 recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:45 localhost python3[31995]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:46 localhost python3[32043]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:46 localhost python3[32061]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:47 localhost python3[32123]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:47 localhost python3[32141]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:48 localhost python3[32203]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:48 localhost python3[32221]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:49 localhost python3[32283]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:49 localhost python3[32301]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:49 localhost python3[32363]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:50 localhost python3[32381]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:50 localhost python3[32443]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:50 localhost python3[32461]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:51 localhost python3[32523]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:51 localhost python3[32541]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:52 localhost python3[32603]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:52 localhost python3[32621]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:53 localhost python3[32683]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:53 localhost python3[32701]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:53 localhost python3[32763]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:54 localhost python3[32781]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:54 localhost python3[32843]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:54 localhost python3[32861]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:55 localhost python3[32891]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:59:56 localhost python3[32939]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:56 localhost python3[32957]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmpd5y2sjzf recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:59 localhost python3[32987]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:00:05 localhost python3[33004]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:00:07 localhost python3[33022]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:00:07 localhost python3[33040]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:00:07 localhost systemd[1]: Reloading. Jan 23 03:00:07 localhost systemd-sysv-generator[33072]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:00:07 localhost systemd-rc-local-generator[33066]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:00:07 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:00:07 localhost systemd[1]: Starting Netfilter Tables... Jan 23 03:00:08 localhost systemd[1]: Finished Netfilter Tables. Jan 23 03:00:08 localhost python3[33130]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:09 localhost python3[33173]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155208.4649062-93062-183233226375920/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:09 localhost python3[33203]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:10 localhost python3[33221]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:10 localhost python3[33270]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:11 localhost python3[33313]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155210.2811592-93291-58077207349730/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:11 localhost python3[33375]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:12 localhost python3[33418]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155211.3595634-93440-248570368479396/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:12 localhost python3[33480]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:13 localhost python3[33523]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155212.369194-93582-51377393836927/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:13 localhost python3[33585]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:14 localhost python3[33628]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155213.3135672-93712-85715280845655/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:15 localhost python3[33690]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:15 localhost python3[33733]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155214.2594025-93821-240049864974874/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:16 localhost python3[33763]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:17 localhost python3[33828]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:17 localhost python3[33845]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:17 localhost python3[33862]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:18 localhost python3[33881]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:18 localhost python3[33897]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Jan 23 03:00:19 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=8 res=1 Jan 23 03:00:19 localhost python3[33917]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:20 localhost python3[33933]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:20 localhost python3[33949]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:21 localhost kernel: SELinux: Converting 2717 SID table entries... Jan 23 03:00:21 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:21 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:21 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=9 res=1 Jan 23 03:00:21 localhost python3[33970]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:22 localhost python3[33986]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:22 localhost python3[34002]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:22 localhost python3[34018]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:23 localhost python3[34034]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:00:26 localhost python3[34051]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 23 03:00:26 localhost python3[34068]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 23 03:00:26 localhost kernel: loop: module loaded Jan 23 03:00:26 localhost kernel: loop0: detected capacity change from 0 to 41943040 Jan 23 03:00:26 localhost python3[34093]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Jan 23 03:00:27 localhost lvm[34097]: PV /dev/loop0 not used. Jan 23 03:00:27 localhost lvm[34099]: PV /dev/loop0 online, VG cinder-volumes is complete. Jan 23 03:00:27 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Jan 23 03:00:27 localhost lvm[34101]: 0 logical volume(s) in volume group "cinder-volumes" now active Jan 23 03:00:27 localhost systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Jan 23 03:00:27 localhost python3[34149]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:28 localhost python3[34192]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155227.301994-94726-254738132355087/source _original_basename=tmp62p2tdf8 follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:28 localhost python3[34222]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Jan 23 03:00:28 localhost systemd[1]: Reloading. Jan 23 03:00:28 localhost systemd-rc-local-generator[34248]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:00:28 localhost systemd-sysv-generator[34253]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:00:28 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:00:28 localhost systemd[1]: Reloading. Jan 23 03:00:28 localhost systemd-rc-local-generator[34284]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:00:28 localhost systemd-sysv-generator[34290]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:00:28 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:00:29 localhost python3[34311]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:29 localhost python3[34327]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:30 localhost python3[34343]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:30 localhost python3[34359]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:30 localhost python3[34375]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:31 localhost python3[34391]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:31 localhost python3[34407]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:37 localhost python3[34553]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:37 localhost python3[34569]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:37 localhost python3[34585]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:38 localhost python3[34601]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:38 localhost python3[34617]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34633]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34649]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34665]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34681]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:40 localhost python3[34729]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:40 localhost python3[34772]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155240.0690396-95615-37530787894810/source _original_basename=tmpimc31g04 follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:41 localhost python3[34802]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:42 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:00:42 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:42 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:42 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=10 res=1 Jan 23 03:00:42 localhost python3[34825]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:43 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:00:43 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:43 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:43 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=11 res=1 Jan 23 03:00:44 localhost python3[34846]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:44 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:00:44 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:44 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:45 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=12 res=1 Jan 23 03:00:45 localhost python3[34867]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:45 localhost python3[34883]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:45 localhost python3[34899]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:46 localhost python3[34915]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:00:46 localhost python3[34931]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:47 localhost python3[34948]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:00:51 localhost python3[34965]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:52 localhost python3[35013]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:52 localhost python3[35056]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155251.6729617-96530-91560485394452/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:52 localhost python3[35086]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:00:52 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Jan 23 03:00:52 localhost systemd[1]: Stopped Load Kernel Modules. Jan 23 03:00:52 localhost systemd[1]: Stopping Load Kernel Modules... Jan 23 03:00:52 localhost systemd[1]: Starting Load Kernel Modules... Jan 23 03:00:52 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jan 23 03:00:52 localhost systemd-modules-load[35089]: Inserted module 'br_netfilter' Jan 23 03:00:52 localhost kernel: Bridge firewalling registered Jan 23 03:00:52 localhost systemd-modules-load[35089]: Module 'msr' is built in Jan 23 03:00:52 localhost systemd[1]: Finished Load Kernel Modules. Jan 23 03:00:53 localhost python3[35140]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:53 localhost python3[35183]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155253.1417754-96647-273850382909471/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:54 localhost python3[35213]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:54 localhost python3[35231]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:55 localhost python3[35249]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:55 localhost python3[35266]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:55 localhost sshd[35284]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:00:55 localhost python3[35283]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:55 localhost python3[35302]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:56 localhost python3[35320]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:56 localhost python3[35338]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:56 localhost python3[35356]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:57 localhost python3[35374]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:57 localhost python3[35392]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:57 localhost python3[35410]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:58 localhost python3[35428]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:58 localhost python3[35445]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:58 localhost python3[35462]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:59 localhost python3[35479]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:59 localhost python3[35496]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:59 localhost python3[35514]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:00:59 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 23 03:00:59 localhost systemd[1]: Stopped Apply Kernel Variables. Jan 23 03:00:59 localhost systemd[1]: Stopping Apply Kernel Variables... Jan 23 03:00:59 localhost systemd[1]: Starting Apply Kernel Variables... Jan 23 03:00:59 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jan 23 03:01:00 localhost systemd[1]: Finished Apply Kernel Variables. Jan 23 03:01:00 localhost python3[35534]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:00 localhost python3[35550]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:01 localhost python3[35566]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:01:01 localhost python3[35582]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:01:01 localhost python3[35609]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:01:02 localhost python3[35625]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:02 localhost python3[35641]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:03 localhost python3[35657]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:03 localhost python3[35673]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:03 localhost python3[35689]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:04 localhost python3[35705]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:04 localhost python3[35721]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:05 localhost python3[35737]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:05 localhost python3[35753]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:05 localhost python3[35769]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:05 localhost python3[35785]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:06 localhost python3[35801]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:06 localhost python3[35817]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:06 localhost python3[35833]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:07 localhost python3[35849]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:07 localhost python3[35865]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:07 localhost python3[35881]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:08 localhost python3[35897]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:08 localhost python3[35913]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Jan 23 03:01:09 localhost python3[35935]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005593102.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Jan 23 03:01:09 localhost python3[35959]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Jan 23 03:01:10 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=13 res=1 Jan 23 03:01:10 localhost python3[35979]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:11 localhost python3[35995]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:11 localhost python3[36011]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:11 localhost python3[36027]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:12 localhost python3[36075]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:12 localhost python3[36118]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155271.8981204-98235-168718274624292/source _original_basename=tmpd7wku1ay follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:13 localhost python3[36180]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:13 localhost python3[36223]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155272.906178-98283-159952709340504/source _original_basename=tmpr9nwn_u_ follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:14 localhost python3[36253]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Jan 23 03:01:14 localhost systemd[1]: Reloading. Jan 23 03:01:14 localhost systemd-rc-local-generator[36276]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:01:14 localhost systemd-sysv-generator[36280]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:01:14 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:01:15 localhost python3[36307]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:15 localhost python3[36323]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:15 localhost python3[36339]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:01:15 localhost systemd[1]: Stopping User Login Management... Jan 23 03:01:15 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Jan 23 03:01:15 localhost systemd[1]: Stopped User Login Management. Jan 23 03:01:15 localhost systemd[1]: Starting Load Kernel Module drm... Jan 23 03:01:15 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 23 03:01:15 localhost systemd[1]: Finished Load Kernel Module drm. Jan 23 03:01:15 localhost systemd[1]: Starting User Login Management... Jan 23 03:01:15 localhost systemd-logind[36347]: New seat seat0. Jan 23 03:01:15 localhost systemd-logind[36347]: Watching system buttons on /dev/input/event0 (Power Button) Jan 23 03:01:15 localhost systemd-logind[36347]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 23 03:01:15 localhost systemd[1]: Started User Login Management. Jan 23 03:01:15 localhost systemd-logind[36347]: New session 14 of user zuul. Jan 23 03:01:15 localhost systemd-logind[36347]: New session 15 of user tripleo-admin. Jan 23 03:01:16 localhost python3[36363]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:16 localhost python3[36379]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:17 localhost python3[36395]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:01:18 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:01:18 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:01:18 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:01:18 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:01:18 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:01:18 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:01:18 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:01:18 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:01:18 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=14 res=1 Jan 23 03:01:18 localhost python3[36416]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:18 localhost python3[36432]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:19 localhost python3[36448]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:20 localhost python3[36466]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:01:23 localhost python3[36483]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Jan 23 03:01:24 localhost python3[36544]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:24 localhost python3[36560]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:24 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:01:24 localhost systemd[26378]: Created slice User Background Tasks Slice. Jan 23 03:01:24 localhost systemd[26378]: Starting Cleanup of User's Temporary Files and Directories... Jan 23 03:01:24 localhost systemd[26378]: Finished Cleanup of User's Temporary Files and Directories. Jan 23 03:01:25 localhost python3[36621]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:25 localhost python3[36664]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155284.5999665-99065-206807527766966/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=759f9c2ec06942a6a18d7c9725429ef480643bae backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:26 localhost python3[36726]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:26 localhost python3[36771]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155285.7547894-99263-127539996339393/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:27 localhost python3[36801]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:27 localhost python3[36817]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:27 localhost python3[36833]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:27 localhost python3[36849]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:28 localhost python3[36897]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:29 localhost python3[36940]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155288.2906756-99400-228211144063217/source _original_basename=tmpxf4vcvwm follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:29 localhost python3[36970]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:29 localhost python3[36986]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:30 localhost python3[37002]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:30 localhost python3[37050]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:31 localhost python3[37093]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155290.529911-99577-123178669833014/source _original_basename=tmp_oezyuu9 follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:31 localhost python3[37123]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:32 localhost python3[37139]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:32 localhost python3[37155]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:01:36 localhost python3[37204]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:36 localhost python3[37249]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155295.8524377-100089-99961979077129/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:37 localhost python3[37280]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:01:37 localhost systemd[1]: Stopping OpenSSH server daemon... Jan 23 03:01:37 localhost systemd[1]: sshd.service: Deactivated successfully. Jan 23 03:01:37 localhost systemd[1]: Stopped OpenSSH server daemon. Jan 23 03:01:37 localhost systemd[1]: Stopped target sshd-keygen.target. Jan 23 03:01:37 localhost systemd[1]: Stopping sshd-keygen.target... Jan 23 03:01:37 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:01:37 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:01:37 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:01:37 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 03:01:37 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 03:01:37 localhost sshd[37284]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:01:37 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 03:01:37 localhost python3[37300]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:38 localhost python3[37316]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:38 localhost python3[37332]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:38 localhost python3[37348]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:38 localhost python3[37364]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:39 localhost python3[37380]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:39 localhost python3[37396]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:40 localhost python3[37412]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:41 localhost python3[37430]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:41 localhost python3[37448]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:01:45 localhost python3[37497]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:45 localhost python3[37542]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155304.935101-100720-24025073477576/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:46 localhost python3[37572]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:01:47 localhost python3[37590]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:01:47 localhost chronyd[767]: chronyd exiting Jan 23 03:01:47 localhost systemd[1]: Stopping NTP client/server... Jan 23 03:01:47 localhost systemd[1]: chronyd.service: Deactivated successfully. Jan 23 03:01:47 localhost systemd[1]: Stopped NTP client/server. Jan 23 03:01:47 localhost systemd[1]: chronyd.service: Consumed 108ms CPU time, read 1.9M from disk, written 4.0K to disk. Jan 23 03:01:47 localhost systemd[1]: Starting NTP client/server... Jan 23 03:01:47 localhost chronyd[37597]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Jan 23 03:01:47 localhost chronyd[37597]: Frequency -30.229 +/- 0.191 ppm read from /var/lib/chrony/drift Jan 23 03:01:47 localhost chronyd[37597]: Loaded seccomp filter (level 2) Jan 23 03:01:47 localhost systemd[1]: Started NTP client/server. Jan 23 03:01:47 localhost python3[37646]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:48 localhost python3[37689]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155307.51973-100813-215318794424710/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:48 localhost python3[37719]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:01:48 localhost systemd[1]: Reloading. Jan 23 03:01:48 localhost systemd-rc-local-generator[37744]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:01:48 localhost systemd-sysv-generator[37750]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:01:48 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:01:49 localhost systemd[1]: Reloading. Jan 23 03:01:49 localhost systemd-rc-local-generator[37782]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:01:49 localhost systemd-sysv-generator[37786]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:01:49 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:01:49 localhost systemd[1]: Starting chronyd online sources service... Jan 23 03:01:49 localhost chronyc[37795]: 200 OK Jan 23 03:01:49 localhost systemd[1]: chrony-online.service: Deactivated successfully. Jan 23 03:01:49 localhost systemd[1]: Finished chronyd online sources service. Jan 23 03:01:49 localhost python3[37811]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:49 localhost chronyd[37597]: System clock was stepped by 0.000000 seconds Jan 23 03:01:50 localhost python3[37828]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:51 localhost chronyd[37597]: Selected source 216.128.178.20 (pool.ntp.org) Jan 23 03:02:00 localhost python3[37845]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:00 localhost chronyd[37597]: System clock was stepped by 0.000041 seconds Jan 23 03:02:00 localhost python3[37862]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:01 localhost python3[37879]: ansible-timezone Invoked with name=UTC hwclock=None Jan 23 03:02:01 localhost systemd[1]: Starting Time & Date Service... Jan 23 03:02:01 localhost systemd[1]: Started Time & Date Service. Jan 23 03:02:02 localhost python3[37899]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:02 localhost python3[37916]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:03 localhost python3[37933]: ansible-slurp Invoked with src=/etc/tuned/active_profile Jan 23 03:02:03 localhost python3[37949]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:02:07 localhost python3[37965]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:07 localhost python3[37981]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Jan 23 03:02:08 localhost python3[37997]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:08 localhost python3[38013]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:08 localhost python3[38029]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:09 localhost python3[38045]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:02:10 localhost kernel: SELinux: Converting 2723 SID table entries... Jan 23 03:02:10 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:02:10 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:02:10 localhost dbus-broker-launch[756]: avc: op=load_policy lsm=selinux seqno=15 res=1 Jan 23 03:02:10 localhost python3[38067]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:02:12 localhost python3[38204]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Jan 23 03:02:12 localhost rsyslogd[760]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Jan 23 03:02:12 localhost python3[38220]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:13 localhost python3[38236]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:13 localhost python3[38252]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Jan 23 03:02:13 localhost rsyslogd[760]: message too long (37323) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Jan 23 03:02:23 localhost python3[38269]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:02:24 localhost python3[38285]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005593102.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Jan 23 03:02:25 localhost python3[38307]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:26 localhost python3[38323]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Jan 23 03:02:26 localhost systemd[1]: Reloading. Jan 23 03:02:26 localhost systemd-sysv-generator[38357]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:26 localhost systemd-rc-local-generator[38353]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:26 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:26 localhost chronyd[37597]: chronyd exiting Jan 23 03:02:26 localhost systemd[1]: Stopping NTP client/server... Jan 23 03:02:26 localhost systemd[1]: chronyd.service: Deactivated successfully. Jan 23 03:02:26 localhost systemd[1]: Stopped NTP client/server. Jan 23 03:02:26 localhost systemd[1]: Starting NTP client/server... Jan 23 03:02:26 localhost chronyd[38374]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Jan 23 03:02:26 localhost chronyd[38374]: Frequency -30.229 +/- 0.191 ppm read from /var/lib/chrony/drift Jan 23 03:02:26 localhost chronyd[38374]: Loaded seccomp filter (level 2) Jan 23 03:02:26 localhost systemd[1]: Started NTP client/server. Jan 23 03:02:30 localhost chronyd[38374]: Selected source 216.128.178.20 (pool.ntp.org) Jan 23 03:02:31 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Jan 23 03:02:33 localhost python3[38396]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593102.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Jan 23 03:02:34 localhost python3[38417]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:35 localhost python3[38434]: ansible-ipaclient_set_hostname Invoked with hostname=np0005593102.ooo.test Jan 23 03:02:35 localhost systemd[1]: Starting Hostname Service... Jan 23 03:02:35 localhost systemd[1]: Started Hostname Service. Jan 23 03:02:36 localhost python3[38453]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593102.ooo.test kdc=ipa.ooo.test on_master=False Jan 23 03:02:37 localhost python3[38474]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005593102.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmpsgug8f3o principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Jan 23 03:02:37 localhost python3[38474]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Jan 23 03:02:38 localhost python3[38495]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593102.ooo.test basedn=dc=ooo,dc=test Jan 23 03:02:39 localhost python3[38512]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593102.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Jan 23 03:02:39 localhost systemd-journald[617]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Jan 23 03:02:39 localhost systemd-journald[617]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 03:02:39 localhost rsyslogd[760]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 03:02:39 localhost rsyslogd[760]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 03:02:40 localhost python3[38530]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005593102.ooo.test krb_name=/tmp/tmpsgug8f3o debug=False Jan 23 03:02:42 localhost sshd[38560]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:02:42 localhost python3[38559]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005593102.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmpsgug8f3o ip_addresses=None Jan 23 03:02:46 localhost systemd[1]: Starting System Security Services Daemon... Jan 23 03:02:46 localhost sssd[38596]: Starting up Jan 23 03:02:46 localhost sssd_be[38597]: Starting up Jan 23 03:02:46 localhost sssd_sudo[38601]: Starting up Jan 23 03:02:46 localhost sssd_nss[38598]: Starting up Jan 23 03:02:46 localhost sssd_pam[38599]: Starting up Jan 23 03:02:46 localhost sssd_ssh[38600]: Starting up Jan 23 03:02:46 localhost sssd_pac[38602]: Starting up Jan 23 03:02:46 localhost systemd[1]: Started System Security Services Daemon. Jan 23 03:02:46 localhost systemd[1]: Reloading. Jan 23 03:02:46 localhost systemd-rc-local-generator[38632]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:46 localhost systemd-sysv-generator[38635]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:47 localhost python3[38657]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Jan 23 03:02:48 localhost systemd[1]: Stopping OpenSSH server daemon... Jan 23 03:02:48 localhost systemd[1]: sshd.service: Deactivated successfully. Jan 23 03:02:48 localhost systemd[1]: Stopped OpenSSH server daemon. Jan 23 03:02:48 localhost systemd[1]: Stopped target sshd-keygen.target. Jan 23 03:02:48 localhost systemd[1]: Stopping sshd-keygen.target... Jan 23 03:02:48 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:02:48 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:02:48 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:02:48 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 03:02:48 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 03:02:48 localhost sshd[38662]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:02:48 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 03:02:48 localhost python3[38680]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Jan 23 03:02:49 localhost python3[38697]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Jan 23 03:02:49 localhost systemd[1]: Reloading. Jan 23 03:02:49 localhost systemd-sysv-generator[38731]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:49 localhost systemd-rc-local-generator[38728]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:49 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:49 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Jan 23 03:02:49 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Jan 23 03:02:49 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Jan 23 03:02:49 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Jan 23 03:02:49 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Jan 23 03:02:50 localhost python3[38756]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpsgug8f3o state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:50 localhost python3[38772]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005593102.ooo.test sssd=True force=True Jan 23 03:02:51 localhost python3[38793]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005593102.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Jan 23 03:02:52 localhost python3[38812]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:52 localhost python3[38828]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpsgug8f3o state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:52 localhost python3[38844]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpsgug8f3o.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:53 localhost python3[38860]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:02:53 localhost systemd[1]: Reloading. Jan 23 03:02:53 localhost systemd-rc-local-generator[38882]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:53 localhost systemd-sysv-generator[38888]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:53 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Jan 23 03:02:53 localhost certmonger[38898]: 2026-01-23 08:02:53 [38898] Changing to root directory. Jan 23 03:02:53 localhost certmonger[38898]: 2026-01-23 08:02:53 [38898] Obtaining system lock. Jan 23 03:02:53 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Jan 23 03:02:53 localhost certmonger[38899]: 2026-01-23 08:02:53 [38899] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[38900]: 2026-01-23 08:02:53 [38900] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[38901]: 2026-01-23 08:02:53 [38901] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[38902]: 2026-01-23 08:02:53 [38902] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[38903]: 2026-01-23 08:02:53 [38903] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[38904]: 2026-01-23 08:02:53 [38904] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[38905]: 2026-01-23 08:02:53 [38905] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[38906]: 2026-01-23 08:02:53 [38906] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[38907]: 2026-01-23 08:02:53 [38907] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[38908]: 2026-01-23 08:02:53 [38908] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[38909]: 2026-01-23 08:02:53 [38909] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[38910]: 2026-01-23 08:02:53 [38910] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[38911]: 2026-01-23 08:02:53 [38911] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[38912]: 2026-01-23 08:02:53 [38912] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[38913]: 2026-01-23 08:02:53 [38913] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[38914]: 2026-01-23 08:02:53 [38914] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[38915]: 2026-01-23 08:02:53 [38915] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[38916]: 2026-01-23 08:02:53 [38916] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[38917]: 2026-01-23 08:02:53 [38917] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[38918]: 2026-01-23 08:02:53 [38918] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[38919]: 2026-01-23 08:02:53 [38919] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[38920]: 2026-01-23 08:02:53 [38920] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[38921]: 2026-01-23 08:02:53 [38921] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[38922]: 2026-01-23 08:02:53 [38922] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[38898]: 2026-01-23 08:02:53 [38898] No hooks set for ca-pre-save command. Jan 23 03:02:53 localhost certmonger[38898]: 2026-01-23 08:02:53 [38898] No hooks set for ca-post-save command. Jan 23 03:02:53 localhost certmonger[38925]: 2026-01-23 08:02:53 [38925] Certificate "OOO.TEST IPA CA" valid for 631151025s. Jan 23 03:02:54 localhost certmonger[38898]: 2026-01-23 08:02:54 [38898] No hooks set for ca-pre-save command. Jan 23 03:02:54 localhost certmonger[38898]: 2026-01-23 08:02:54 [38898] No hooks set for ca-post-save command. Jan 23 03:02:54 localhost certmonger[38928]: 2026-01-23 08:02:54 [38928] Certificate "Local Signing Authority" valid for 31535999s. Jan 23 03:03:02 localhost python3[38976]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:03:03 localhost python3[39019]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155382.5864964-104314-6824956248243/source _original_basename=tmpjvwetplj follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:03 localhost python3[39049]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:03:05 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 03:03:05 localhost python3[39172]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:03:07 localhost python3[39295]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Jan 23 03:03:09 localhost python3[39311]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 03:03:09 localhost python3[39327]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 03:03:10 localhost python3[39343]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 03:03:11 localhost python3[39363]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:03:14 localhost python3[39380]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:03:17 localhost python3[39397]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:17 localhost python3[39413]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:18 localhost python3[39429]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:03:18 localhost systemd[1]: Reloading. Jan 23 03:03:18 localhost systemd-sysv-generator[39462]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:03:18 localhost systemd-rc-local-generator[39456]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:03:18 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:03:19 localhost python3[39483]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005593102.ctlplane.ooo.test'] principal=['HTTP/np0005593102.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.ctlplane.ooo.test" for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.ctlplane.ooo.test Jan 23 03:03:19 localhost certmonger[39493]: " for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593102.ctlplane.ooo.test@OOO.TEST Jan 23 03:03:19 localhost certmonger[39493]: " for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:19 localhost certmonger[39493]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTkzMTAyLmN0bHBsYW5lLm9v Jan 23 03:03:19 localhost certmonger[39493]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzPRCiNKIOXID Jan 23 03:03:19 localhost certmonger[39493]: rtMe2g6F+1gSizBmlGSt31UGLI4d5p32aDEphpILiZaHcLuG8yo0E4M0o//UfwEi Jan 23 03:03:19 localhost certmonger[39493]: nLU4wpexjppMd8z220/8o8Cg5TcHZj8OgMy1og7ndXxKSLT6yN7de+kYA2IMHLvd Jan 23 03:03:19 localhost certmonger[39493]: /6tQR0ldwpnzJT9JviB4dhcup8NiKOflAkkJxlETD12Vt/wVzvyjXMvrKRKO7+XA Jan 23 03:03:19 localhost certmonger[39493]: sN3OjuHeHwP8eTDV1YD4DRNNxdbBW95ULR/RU+st+3Wg2P1Qyp1YjfSJOYuW9N5D Jan 23 03:03:19 localhost certmonger[39493]: JASh3vtTV9Dt9tJk23+cwt7dTtdEsQQO7jMnXd2tYjur0jgtj/1o2CvVTFYNTR+4 Jan 23 03:03:19 localhost certmonger[39493]: aNWhNvajPQIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIA Jan 23 03:03:19 localhost certmonger[39493]: MwAwADgAMAAzADEAOTCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Jan 23 03:03:19 localhost certmonger[39493]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDIuY3RscGxhbmUub29vLnRlc3Sg Jan 23 03:03:19 localhost certmonger[39493]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEwMi5jdGxwbGFuZS5vb28u Jan 23 03:03:19 localhost certmonger[39493]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Jan 23 03:03:19 localhost certmonger[39493]: oSgwJhsESFRUUBsebnAwMDA1NTkzMTAyLmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Jan 23 03:03:19 localhost certmonger[39493]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Jan 23 03:03:19 localhost certmonger[39493]: BBR0UTluVOlQl+o2z1uj1sKxd2KH5TANBgkqhkiG9w0BAQsFAAOCAQEATLPjDtgD Jan 23 03:03:19 localhost certmonger[39493]: utHp4Yuob/HF22oNPh14IkvSlSrTZr2Tcn+V7OIlH9am0chaLtA+lKCwfr0Y0kVg Jan 23 03:03:19 localhost certmonger[39493]: fDY1LOjH4yh2YQ6ny3VfvxWY2IfZoCRTqGClgFT+gczyw0j9aLyAC+uGFPbT/DcA Jan 23 03:03:19 localhost certmonger[39493]: rG6QXfSovbMeQA67xB/Xjt+tVnmmoBo3AVOk63oui7js47LX0ZGJQCFXWxbqTYBa Jan 23 03:03:19 localhost certmonger[39493]: CWB9or13BaX6UzOk1QhQP2kwAl0NfIY8cvJmRPYqk2+juAGHsUMSE5dfy3rJkDhM Jan 23 03:03:19 localhost certmonger[39493]: 5svqd28Bf0jQMz7zdLChjSg1IsrtNWE+Nn6BE3r1hTyrSb7hrxAKDqt+cA8sf8T3 Jan 23 03:03:19 localhost certmonger[39493]: VWps6O6CI+4oOw== Jan 23 03:03:19 localhost certmonger[39493]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:19 localhost certmonger[39493]: " for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDM9EKI0og5cgOu0x7aDoX7WBKLMGaUZK3fVQYsjh3mnfZoMSmGkguJlodwu4bzKjQTgzSj/9R/ASKctTjCl7GOmkx3zPbbT/yjwKDlNwdmPw6AzLWiDud1fEpItPrI3t176RgDYgwcu93/q1BHSV3CmfMlP0m+IHh2Fy6nw2Io5+UCSQnGURMPXZW3/BXO/KNcy+spEo7v5cCw3c6O4d4fA/x5MNXVgPgNE03F1sFb3lQtH9FT6y37daDY/VDKnViN9Ik5i5b03kMkBKHe+1NX0O320mTbf5zC3t1O10SxBA7uMydd3a1iO6vSOC2P/WjYK9VMVg1NH7ho1aE29qM9AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAroQ+62npoBrS24NL4+bVLC+mVq7kk+ctrzuMh+joovezCYEPOKz2S/RfHkzDEn/8hzO10wxyRi/PehDX25pgWP5Cicw6llQ267YkmzgJyst90FDxZ7m6f00SnKunA/y/xiJnyzJfG/hURir0bSmUQN+WYl9fgpNIqJrd89aWtB0aeF2I70gHF/NGf3Pjxw/IIA3+eQI1BwGjH7KwL5GNNWB7BTQIwOgFuG/SBK8YrBbWN0xXq+t4v2CYjv/t2hY1Aff6YWXPsUmTJju48IkXY4R61ecRjqtWP+vGZK0ko2JOyjmzEkk+6a3Joy0brPzi7cgkPezqKbo3owvCGdBMaw==" for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzPRCiNKIOXIDrtMe2g6F+1gSizBmlGSt31UGLI4d5p32aDEphpILiZaHcLuG8yo0E4M0o//UfwEinLU4wpexjppMd8z220/8o8Cg5TcHZj8OgMy1og7ndXxKSLT6yN7de+kYA2IMHLvd/6tQR0ldwpnzJT9JviB4dhcup8NiKOflAkkJxlETD12Vt/wVzvyjXMvrKRKO7+XAsN3OjuHeHwP8eTDV1YD4DRNNxdbBW95ULR/RU+st+3Wg2P1Qyp1YjfSJOYuW9N5DJASh3vtTV9Dt9tJk23+cwt7dTtdEsQQO7jMnXd2tYjur0jgtj/1o2CvVTFYNTR+4aNWhNvajPQIDAQAB" for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:19 localhost certmonger[39493]: 2026-01-23 08:03:19 [39493] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:19 localhost certmonger[38898]: 2026-01-23 08:03:19 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[39493]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:20 localhost certmonger[39493]: Certificate: "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" Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Certificate submission still ongoing. Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Certificate submission attempt complete. Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Child status = 0. Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Child output: Jan 23 03:03:20 localhost certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38898]: MIIFWDCCA8CgAwIBAgIQGK7nToJX2n6QEHGdoWY+FjANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:20 localhost certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:20 localhost certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDMyMFoXDTI4MDEyNDA4MDMyMFowPDERMA8GA1UECgwI Jan 23 03:03:20 localhost certmonger[38898]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMi5jdGxwbGFuZS5vb28udGVz Jan 23 03:03:20 localhost certmonger[38898]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMz0QojSiDlyA67THtoO Jan 23 03:03:20 localhost certmonger[38898]: hftYEoswZpRkrd9VBiyOHead9mgxKYaSC4mWh3C7hvMqNBODNKP/1H8BIpy1OMKX Jan 23 03:03:20 localhost certmonger[38898]: sY6aTHfM9ttP/KPAoOU3B2Y/DoDMtaIO53V8Ski0+sje3XvpGANiDBy73f+rUEdJ Jan 23 03:03:20 localhost certmonger[38898]: XcKZ8yU/Sb4geHYXLqfDYijn5QJJCcZREw9dlbf8Fc78o1zL6ykSju/lwLDdzo7h Jan 23 03:03:20 localhost certmonger[38898]: 3h8D/Hkw1dWA+A0TTcXWwVveVC0f0VPrLft1oNj9UMqdWI30iTmLlvTeQyQEod77 Jan 23 03:03:20 localhost certmonger[38898]: U1fQ7fbSZNt/nMLe3U7XRLEEDu4zJ13drWI7q9I4LY/9aNgr1UxWDU0fuGjVoTb2 Jan 23 03:03:20 localhost certmonger[38898]: oz0CAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:20 localhost certmonger[38898]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38898]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:20 localhost certmonger[38898]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38898]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:20 localhost certmonger[38898]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOrXbJ9A Jan 23 03:03:20 localhost certmonger[38898]: sjI/QFSVv2PjFof2SJpoMIG2BgNVHREEga4wgauCHm5wMDAwNTU5MzEwMi5jdGxw Jan 23 03:03:20 localhost certmonger[38898]: bGFuZS5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTkzMTAy Jan 23 03:03:20 localhost certmonger[38898]: LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Jan 23 03:03:20 localhost certmonger[38898]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU1OTMxMDIuY3RscGxhbmUu Jan 23 03:03:20 localhost certmonger[38898]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBABRwvS4QhhMqfvDAwvAIXvmWQi8J Jan 23 03:03:20 localhost certmonger[38898]: cq2wwEYHa2pRLptwafRmWQpU3zmizV2idlksS9l9+kj4sYKnF7CVAabMMHAP3ZPp Jan 23 03:03:20 localhost certmonger[38898]: X0Sar8GNNLOEh8D+T3rMjNjLyghiRC/MfruWtrQChXnzu+AQ1fPFuJFwXPPq684+ Jan 23 03:03:20 localhost certmonger[38898]: Y9mlIHCfkT4h6yAYUB0xA2Ld/N1ky7Hv0PanWbAr7Qm4xNPGxA9GSnzmCY43kH5M Jan 23 03:03:20 localhost certmonger[38898]: wL6b1Y1MyxpURBqkzlV6rMdgK3O/JG0AwXHp7X4lD9DMHtgJDJNQEsaUh+KCUa2g Jan 23 03:03:20 localhost certmonger[38898]: VNzr1zRjcT5/U9qbOBugc26uKKjM4USozqcBxsfUA7K+CObXewwGAfFj7QGg1fjc Jan 23 03:03:20 localhost certmonger[38898]: Bmrxw6oH9/ES7dB2hiqzKhO1KdI/YU5c3P88mD1NftO6i4ckrWZII/f4SP0VGYCy Jan 23 03:03:20 localhost certmonger[38898]: dKkk7urHoiHgvN5n54i9osSDX1Mm0NwdosTx09U+atJQ6DiWmjhyrVSco9e2uBQk Jan 23 03:03:20 localhost certmonger[38898]: t06bP6LyLIhO1fF0i1leRP0I9XWBNZLw1uR5/w== Jan 23 03:03:20 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38898]: " Jan 23 03:03:20 localhost certmonger[39495]: 2026-01-23 08:03:20 [39495] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[39495]: MIIFWDCCA8CgAwIBAgIQGK7nToJX2n6QEHGdoWY+FjANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:20 localhost certmonger[39495]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:20 localhost certmonger[39495]: aXR5MB4XDTI2MDEyMzA4MDMyMFoXDTI4MDEyNDA4MDMyMFowPDERMA8GA1UECgwI Jan 23 03:03:20 localhost certmonger[39495]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMi5jdGxwbGFuZS5vb28udGVz Jan 23 03:03:20 localhost certmonger[39495]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMz0QojSiDlyA67THtoO Jan 23 03:03:20 localhost certmonger[39495]: hftYEoswZpRkrd9VBiyOHead9mgxKYaSC4mWh3C7hvMqNBODNKP/1H8BIpy1OMKX Jan 23 03:03:20 localhost certmonger[39495]: sY6aTHfM9ttP/KPAoOU3B2Y/DoDMtaIO53V8Ski0+sje3XvpGANiDBy73f+rUEdJ Jan 23 03:03:20 localhost certmonger[39495]: XcKZ8yU/Sb4geHYXLqfDYijn5QJJCcZREw9dlbf8Fc78o1zL6ykSju/lwLDdzo7h Jan 23 03:03:20 localhost certmonger[39495]: 3h8D/Hkw1dWA+A0TTcXWwVveVC0f0VPrLft1oNj9UMqdWI30iTmLlvTeQyQEod77 Jan 23 03:03:20 localhost certmonger[39495]: U1fQ7fbSZNt/nMLe3U7XRLEEDu4zJ13drWI7q9I4LY/9aNgr1UxWDU0fuGjVoTb2 Jan 23 03:03:20 localhost certmonger[39495]: oz0CAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:20 localhost certmonger[39495]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[39495]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:20 localhost certmonger[39495]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[39495]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:20 localhost certmonger[39495]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOrXbJ9A Jan 23 03:03:20 localhost certmonger[39495]: sjI/QFSVv2PjFof2SJpoMIG2BgNVHREEga4wgauCHm5wMDAwNTU5MzEwMi5jdGxw Jan 23 03:03:20 localhost certmonger[39495]: bGFuZS5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTkzMTAy Jan 23 03:03:20 localhost certmonger[39495]: LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Jan 23 03:03:20 localhost certmonger[39495]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU1OTMxMDIuY3RscGxhbmUu Jan 23 03:03:20 localhost certmonger[39495]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBABRwvS4QhhMqfvDAwvAIXvmWQi8J Jan 23 03:03:20 localhost certmonger[39495]: cq2wwEYHa2pRLptwafRmWQpU3zmizV2idlksS9l9+kj4sYKnF7CVAabMMHAP3ZPp Jan 23 03:03:20 localhost certmonger[39495]: X0Sar8GNNLOEh8D+T3rMjNjLyghiRC/MfruWtrQChXnzu+AQ1fPFuJFwXPPq684+ Jan 23 03:03:20 localhost certmonger[39495]: Y9mlIHCfkT4h6yAYUB0xA2Ld/N1ky7Hv0PanWbAr7Qm4xNPGxA9GSnzmCY43kH5M Jan 23 03:03:20 localhost certmonger[39495]: wL6b1Y1MyxpURBqkzlV6rMdgK3O/JG0AwXHp7X4lD9DMHtgJDJNQEsaUh+KCUa2g Jan 23 03:03:20 localhost certmonger[39495]: VNzr1zRjcT5/U9qbOBugc26uKKjM4USozqcBxsfUA7K+CObXewwGAfFj7QGg1fjc Jan 23 03:03:20 localhost certmonger[39495]: Bmrxw6oH9/ES7dB2hiqzKhO1KdI/YU5c3P88mD1NftO6i4ckrWZII/f4SP0VGYCy Jan 23 03:03:20 localhost certmonger[39495]: dKkk7urHoiHgvN5n54i9osSDX1Mm0NwdosTx09U+atJQ6DiWmjhyrVSco9e2uBQk Jan 23 03:03:20 localhost certmonger[39495]: t06bP6LyLIhO1fF0i1leRP0I9XWBNZLw1uR5/w== Jan 23 03:03:20 localhost certmonger[39495]: -----END CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[39495]: ". Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Certificate submission still ongoing. Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Certificate submission postprocessing complete. Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Child status = 0. Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Child output: Jan 23 03:03:20 localhost certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nt06bP6LyLIhO1fF0i1leRP0I9XWBNZLw1uR5/w==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:20 localhost certmonger[38898]: " Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38898]: MIIFWDCCA8CgAwIBAgIQGK7nToJX2n6QEHGdoWY+FjANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:20 localhost certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:20 localhost certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDMyMFoXDTI4MDEyNDA4MDMyMFowPDERMA8GA1UECgwI Jan 23 03:03:20 localhost certmonger[38898]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMi5jdGxwbGFuZS5vb28udGVz Jan 23 03:03:20 localhost certmonger[38898]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMz0QojSiDlyA67THtoO Jan 23 03:03:20 localhost certmonger[38898]: hftYEoswZpRkrd9VBiyOHead9mgxKYaSC4mWh3C7hvMqNBODNKP/1H8BIpy1OMKX Jan 23 03:03:20 localhost certmonger[38898]: sY6aTHfM9ttP/KPAoOU3B2Y/DoDMtaIO53V8Ski0+sje3XvpGANiDBy73f+rUEdJ Jan 23 03:03:20 localhost certmonger[38898]: XcKZ8yU/Sb4geHYXLqfDYijn5QJJCcZREw9dlbf8Fc78o1zL6ykSju/lwLDdzo7h Jan 23 03:03:20 localhost certmonger[38898]: 3h8D/Hkw1dWA+A0TTcXWwVveVC0f0VPrLft1oNj9UMqdWI30iTmLlvTeQyQEod77 Jan 23 03:03:20 localhost certmonger[38898]: U1fQ7fbSZNt/nMLe3U7XRLEEDu4zJ13drWI7q9I4LY/9aNgr1UxWDU0fuGjVoTb2 Jan 23 03:03:20 localhost certmonger[38898]: oz0CAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:20 localhost certmonger[38898]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38898]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:20 localhost certmonger[38898]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38898]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:20 localhost certmonger[38898]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOrXbJ9A Jan 23 03:03:20 localhost certmonger[38898]: sjI/QFSVv2PjFof2SJpoMIG2BgNVHREEga4wgauCHm5wMDAwNTU5MzEwMi5jdGxw Jan 23 03:03:20 localhost certmonger[38898]: bGFuZS5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTkzMTAy Jan 23 03:03:20 localhost certmonger[38898]: LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Jan 23 03:03:20 localhost certmonger[38898]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU1OTMxMDIuY3RscGxhbmUu Jan 23 03:03:20 localhost certmonger[38898]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBABRwvS4QhhMqfvDAwvAIXvmWQi8J Jan 23 03:03:20 localhost certmonger[38898]: cq2wwEYHa2pRLptwafRmWQpU3zmizV2idlksS9l9+kj4sYKnF7CVAabMMHAP3ZPp Jan 23 03:03:20 localhost certmonger[38898]: X0Sar8GNNLOEh8D+T3rMjNjLyghiRC/MfruWtrQChXnzu+AQ1fPFuJFwXPPq684+ Jan 23 03:03:20 localhost certmonger[38898]: Y9mlIHCfkT4h6yAYUB0xA2Ld/N1ky7Hv0PanWbAr7Qm4xNPGxA9GSnzmCY43kH5M Jan 23 03:03:20 localhost certmonger[38898]: wL6b1Y1MyxpURBqkzlV6rMdgK3O/JG0AwXHp7X4lD9DMHtgJDJNQEsaUh+KCUa2g Jan 23 03:03:20 localhost certmonger[38898]: VNzr1zRjcT5/U9qbOBugc26uKKjM4USozqcBxsfUA7K+CObXewwGAfFj7QGg1fjc Jan 23 03:03:20 localhost certmonger[38898]: Bmrxw6oH9/ES7dB2hiqzKhO1KdI/YU5c3P88mD1NftO6i4ckrWZII/f4SP0VGYCy Jan 23 03:03:20 localhost certmonger[38898]: dKkk7urHoiHgvN5n54i9osSDX1Mm0NwdosTx09U+atJQ6DiWmjhyrVSco9e2uBQk Jan 23 03:03:20 localhost certmonger[38898]: t06bP6LyLIhO1fF0i1leRP0I9XWBNZLw1uR5/w== Jan 23 03:03:20 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38898]: ". Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] No hooks set for pre-save command. Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[39503]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Jan 23 03:03:20 localhost certmonger[38898]: 2026-01-23 08:03:20 [38898] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 23 03:03:20 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 23 03:03:21 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Jan 23 03:03:21 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Jan 23 03:03:21 localhost python3[39523]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005593102.storage.ooo.test'] principal=['HTTP/np0005593102.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.storage.ooo.test" for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.storage.ooo.test Jan 23 03:03:21 localhost certmonger[39540]: " for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593102.storage.ooo.test@OOO.TEST Jan 23 03:03:21 localhost certmonger[39540]: " for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:21 localhost certmonger[39540]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTkzMTAyLnN0b3JhZ2Uub29v Jan 23 03:03:21 localhost certmonger[39540]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDQueWSOtnjVxQ7 Jan 23 03:03:21 localhost certmonger[39540]: DsJbRSRiIANAUbcXbM+0oERGuPcnZyWfF81hGy++02ETbXbEMQDVfAOLVsworZqp Jan 23 03:03:21 localhost certmonger[39540]: QdIb4CwUXFKf1TbzgQKeL3AgLZq0nclZf+oPSBWdLb/WMgV2IAqGhYHcT4IKZU+b Jan 23 03:03:21 localhost certmonger[39540]: 2EbsRQo7iS1kSiAPqxk9Af9/njPRjfJ+Ovun2pbfMd4Oti5BPBVTEU/mniqyxabP Jan 23 03:03:21 localhost certmonger[39540]: +QCxA1l0keRtm5T6eSBXGB2fOSVLKFWEnKxvo/RtN9gImmLfnef6DYp+g+bzHBC2 Jan 23 03:03:21 localhost certmonger[39540]: 2AQmWxLlQRMw0/vW7KMOR0ih0UDCkLWInC3S2j+PfpLj2MD1IIJQQGY0LsIZZN0r Jan 23 03:03:21 localhost certmonger[39540]: jYyw0BINAgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANgAwADEAMgAz Jan 23 03:03:21 localhost certmonger[39540]: ADAAOAAwADMAMgAxMIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Jan 23 03:03:21 localhost certmonger[39540]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMi5zdG9yYWdlLm9vby50ZXN0oDsG Jan 23 03:03:21 localhost certmonger[39540]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDIuc3RvcmFnZS5vb28udGVz Jan 23 03:03:21 localhost certmonger[39540]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Jan 23 03:03:21 localhost certmonger[39540]: JRsESFRUUBsdbnAwMDA1NTkzMTAyLnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Jan 23 03:03:21 localhost certmonger[39540]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFEeQ Jan 23 03:03:21 localhost certmonger[39540]: CLaTeCHSrul9IAWquYFXM7nPMA0GCSqGSIb3DQEBCwUAA4IBAQAP8GkY2032Ej6A Jan 23 03:03:21 localhost certmonger[39540]: RV7T3t9zRfDkFMf7Qz0LyeiSMj6WC+xUp3PEL0YN7LxDF0m8S5Bjlx10t9KQldBa Jan 23 03:03:21 localhost certmonger[39540]: mHp3hq73ZFKW0zx1BLuwFzCjrF/w0IjtXqOwWoxrDKqY2DDy4WFT69N90tZV4jDr Jan 23 03:03:21 localhost certmonger[39540]: jnuASjS4K6rrvuDEib1UMQjBbKT02x1Y5BknrlwLAe4hEh/4CtvJFJn33dgr92Wl Jan 23 03:03:21 localhost certmonger[39540]: 7+J4QP/LQE6cMtLSdi/XtrWDb/GtKdmGJ8mWShW+xHKphUW8w2tmbLWN89yA07c1 Jan 23 03:03:21 localhost certmonger[39540]: nXDBBQ2P+UflZZ2vvBWV5T8Jo5hvDCTnDgQLGDH/G0arMMzkgizj4U63txbm4jWA Jan 23 03:03:21 localhost certmonger[39540]: 5Cm/LVK9 Jan 23 03:03:21 localhost certmonger[39540]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:21 localhost certmonger[39540]: " for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDQueWSOtnjVxQ7DsJbRSRiIANAUbcXbM+0oERGuPcnZyWfF81hGy++02ETbXbEMQDVfAOLVsworZqpQdIb4CwUXFKf1TbzgQKeL3AgLZq0nclZf+oPSBWdLb/WMgV2IAqGhYHcT4IKZU+b2EbsRQo7iS1kSiAPqxk9Af9/njPRjfJ+Ovun2pbfMd4Oti5BPBVTEU/mniqyxabP+QCxA1l0keRtm5T6eSBXGB2fOSVLKFWEnKxvo/RtN9gImmLfnef6DYp+g+bzHBC22AQmWxLlQRMw0/vW7KMOR0ih0UDCkLWInC3S2j+PfpLj2MD1IIJQQGY0LsIZZN0rjYyw0BINAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEADnVcFcNQ5zg6TO28biWbWSq4IMjvvJiyjR/lQaXJWcGJPPFX5LAyYLgk/cglLi5xs1pJb08w4SvvpN8GSVIcXGfgfFOW+OrXSGcdHytBYoRBdXPXUPU/8uVGLzTtLYdpvowMeBonrdygVH7bA5hizOshqBoJhi8zeNw8NZK/3fY/KpPxtX1MlwjZvzW500yc0QitpiEh7pRJujtZUzaRxbfIAOy6u5YqCclvcAO2g3NhFH3/1wNATfouLNIuSxPuQU8LS8GxbG6qUa0l0+j/ytC390MS2IzzVykzXaKFzlnvBA7zsFr761Bth4OlIpnhQnPy1UpxVDTq3eZOGSBnRg==" for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0LnlkjrZ41cUOw7CW0UkYiADQFG3F2zPtKBERrj3J2clnxfNYRsvvtNhE212xDEA1XwDi1bMKK2aqUHSG+AsFFxSn9U284ECni9wIC2atJ3JWX/qD0gVnS2/1jIFdiAKhoWB3E+CCmVPm9hG7EUKO4ktZEogD6sZPQH/f54z0Y3yfjr7p9qW3zHeDrYuQTwVUxFP5p4qssWmz/kAsQNZdJHkbZuU+nkgVxgdnzklSyhVhJysb6P0bTfYCJpi353n+g2KfoPm8xwQttgEJlsS5UETMNP71uyjDkdIodFAwpC1iJwt0to/j36S49jA9SCCUEBmNC7CGWTdK42MsNASDQIDAQAB" for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:21 localhost certmonger[39540]: 2026-01-23 08:03:21 [39540] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:21 localhost certmonger[38898]: 2026-01-23 08:03:21 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[39540]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost certmonger[39540]: Certificate: "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" Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Certificate submission attempt complete. Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Child status = 0. Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Child output: Jan 23 03:03:22 localhost certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:22 localhost certmonger[38898]: MIIFVDCCA7ygAwIBAgIQaIGhniRpZCRc7co/Egiz7TANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:22 localhost certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:22 localhost certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDMyMVoXDTI4MDEyNDA4MDMyMVowOzERMA8GA1UECgwI Jan 23 03:03:22 localhost certmonger[38898]: T09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTU5MzEwMi5zdG9yYWdlLm9vby50ZXN0 Jan 23 03:03:22 localhost certmonger[38898]: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0LnlkjrZ41cUOw7CW0Uk Jan 23 03:03:22 localhost certmonger[38898]: YiADQFG3F2zPtKBERrj3J2clnxfNYRsvvtNhE212xDEA1XwDi1bMKK2aqUHSG+As Jan 23 03:03:22 localhost certmonger[38898]: FFxSn9U284ECni9wIC2atJ3JWX/qD0gVnS2/1jIFdiAKhoWB3E+CCmVPm9hG7EUK Jan 23 03:03:22 localhost certmonger[38898]: O4ktZEogD6sZPQH/f54z0Y3yfjr7p9qW3zHeDrYuQTwVUxFP5p4qssWmz/kAsQNZ Jan 23 03:03:22 localhost certmonger[38898]: dJHkbZuU+nkgVxgdnzklSyhVhJysb6P0bTfYCJpi353n+g2KfoPm8xwQttgEJlsS Jan 23 03:03:22 localhost certmonger[38898]: 5UETMNP71uyjDkdIodFAwpC1iJwt0to/j36S49jA9SCCUEBmNC7CGWTdK42MsNAS Jan 23 03:03:22 localhost certmonger[38898]: DQIDAQABo4IB2jCCAdYwHwYDVR0jBBgwFoAU9rnfT/lUfXM9lKGS0+tarXcs8jgw Jan 23 03:03:22 localhost certmonger[38898]: OgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50 Jan 23 03:03:22 localhost certmonger[38898]: ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB Jan 23 03:03:22 localhost certmonger[38898]: BggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50 Jan 23 03:03:22 localhost certmonger[38898]: ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex Jan 23 03:03:22 localhost certmonger[38898]: HjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU6fEboT84 Jan 23 03:03:22 localhost certmonger[38898]: 5jUegDsd/2CIT1RLK9IwgbMGA1UdEQSBqzCBqIIdbnAwMDA1NTkzMTAyLnN0b3Jh Jan 23 03:03:22 localhost certmonger[38898]: Z2Uub29vLnRlc3SgOwYKKwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTU5MzEwMi5z Jan 23 03:03:22 localhost certmonger[38898]: dG9yYWdlLm9vby50ZXN0QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRF Jan 23 03:03:22 localhost certmonger[38898]: U1ShMDAuoAMCAQGhJzAlGwRIVFRQGx1ucDAwMDU1OTMxMDIuc3RvcmFnZS5vb28u Jan 23 03:03:22 localhost certmonger[38898]: dGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAu81T+abzS0Ob6L6H8Z+tLDa95LoB/fxR Jan 23 03:03:22 localhost certmonger[38898]: oPGZ/BaZhJa2wc4dkR27Z1LIs6sBgrtyJ9jFb7Q7AhsDFbDdx5k2mEDgFN2W/VX0 Jan 23 03:03:22 localhost certmonger[38898]: n76NntdnLXPtwWCzJGEzskJRHMkz7KBQqCsFPOcf/yu3bhMLmhvEPFXOc6S1Bngv Jan 23 03:03:22 localhost certmonger[38898]: ePb488uPqGRJ1NxT630rj5ipQvy217lwNzAKUOeInH8DyjWKEKuNC6filI31Yn2j Jan 23 03:03:22 localhost certmonger[38898]: 5VBk26lLjWQYtlTs76o1+eD7Ekzgn0neBK9IwY7qVe2YsgjAiKNE++1Kp9N44snW Jan 23 03:03:22 localhost certmonger[38898]: 60vZdygdClDD9XC9u5k4QmI0vSMxOkkTNvaWTGQOQE9ajWwULLWaaOCYwhe/7+Lx Jan 23 03:03:22 localhost certmonger[38898]: ERJY0LQU/WgdKgFK1Hgn+sZ4aOLwhrrHUBiR2GlEyQk760yDPtN2DwNEpVxDoF1w Jan 23 03:03:22 localhost certmonger[38898]: 04qOa7wGP/k8vfKMSJVgLVyEbrtYmQyH0qZOMNcJUuOopFuENN8wR6q1ZAPgr+x8 Jan 23 03:03:22 localhost certmonger[38898]: g2hcR1yPETCMUGK4BKnXffXMT4YYVhZc Jan 23 03:03:22 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:22 localhost certmonger[38898]: " Jan 23 03:03:22 localhost certmonger[39543]: 2026-01-23 08:03:22 [39543] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:22 localhost certmonger[39543]: MIIFVDCCA7ygAwIBAgIQaIGhniRpZCRc7co/Egiz7TANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:22 localhost certmonger[39543]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:22 localhost certmonger[39543]: aXR5MB4XDTI2MDEyMzA4MDMyMVoXDTI4MDEyNDA4MDMyMVowOzERMA8GA1UECgwI Jan 23 03:03:22 localhost certmonger[39543]: T09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTU5MzEwMi5zdG9yYWdlLm9vby50ZXN0 Jan 23 03:03:22 localhost certmonger[39543]: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0LnlkjrZ41cUOw7CW0Uk Jan 23 03:03:22 localhost certmonger[39543]: YiADQFG3F2zPtKBERrj3J2clnxfNYRsvvtNhE212xDEA1XwDi1bMKK2aqUHSG+As Jan 23 03:03:22 localhost certmonger[39543]: FFxSn9U284ECni9wIC2atJ3JWX/qD0gVnS2/1jIFdiAKhoWB3E+CCmVPm9hG7EUK Jan 23 03:03:22 localhost certmonger[39543]: O4ktZEogD6sZPQH/f54z0Y3yfjr7p9qW3zHeDrYuQTwVUxFP5p4qssWmz/kAsQNZ Jan 23 03:03:22 localhost certmonger[39543]: dJHkbZuU+nkgVxgdnzklSyhVhJysb6P0bTfYCJpi353n+g2KfoPm8xwQttgEJlsS Jan 23 03:03:22 localhost certmonger[39543]: 5UETMNP71uyjDkdIodFAwpC1iJwt0to/j36S49jA9SCCUEBmNC7CGWTdK42MsNAS Jan 23 03:03:22 localhost certmonger[39543]: DQIDAQABo4IB2jCCAdYwHwYDVR0jBBgwFoAU9rnfT/lUfXM9lKGS0+tarXcs8jgw Jan 23 03:03:22 localhost certmonger[39543]: OgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50 Jan 23 03:03:22 localhost certmonger[39543]: ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB Jan 23 03:03:22 localhost certmonger[39543]: BggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50 Jan 23 03:03:22 localhost certmonger[39543]: ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex Jan 23 03:03:22 localhost certmonger[39543]: HjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU6fEboT84 Jan 23 03:03:22 localhost certmonger[39543]: 5jUegDsd/2CIT1RLK9IwgbMGA1UdEQSBqzCBqIIdbnAwMDA1NTkzMTAyLnN0b3Jh Jan 23 03:03:22 localhost certmonger[39543]: Z2Uub29vLnRlc3SgOwYKKwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTU5MzEwMi5z Jan 23 03:03:22 localhost certmonger[39543]: dG9yYWdlLm9vby50ZXN0QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRF Jan 23 03:03:22 localhost certmonger[39543]: U1ShMDAuoAMCAQGhJzAlGwRIVFRQGx1ucDAwMDU1OTMxMDIuc3RvcmFnZS5vb28u Jan 23 03:03:22 localhost certmonger[39543]: dGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAu81T+abzS0Ob6L6H8Z+tLDa95LoB/fxR Jan 23 03:03:22 localhost certmonger[39543]: oPGZ/BaZhJa2wc4dkR27Z1LIs6sBgrtyJ9jFb7Q7AhsDFbDdx5k2mEDgFN2W/VX0 Jan 23 03:03:22 localhost certmonger[39543]: n76NntdnLXPtwWCzJGEzskJRHMkz7KBQqCsFPOcf/yu3bhMLmhvEPFXOc6S1Bngv Jan 23 03:03:22 localhost certmonger[39543]: ePb488uPqGRJ1NxT630rj5ipQvy217lwNzAKUOeInH8DyjWKEKuNC6filI31Yn2j Jan 23 03:03:22 localhost certmonger[39543]: 5VBk26lLjWQYtlTs76o1+eD7Ekzgn0neBK9IwY7qVe2YsgjAiKNE++1Kp9N44snW Jan 23 03:03:22 localhost certmonger[39543]: 60vZdygdClDD9XC9u5k4QmI0vSMxOkkTNvaWTGQOQE9ajWwULLWaaOCYwhe/7+Lx Jan 23 03:03:22 localhost certmonger[39543]: ERJY0LQU/WgdKgFK1Hgn+sZ4aOLwhrrHUBiR2GlEyQk760yDPtN2DwNEpVxDoF1w Jan 23 03:03:22 localhost certmonger[39543]: 04qOa7wGP/k8vfKMSJVgLVyEbrtYmQyH0qZOMNcJUuOopFuENN8wR6q1ZAPgr+x8 Jan 23 03:03:22 localhost certmonger[39543]: g2hcR1yPETCMUGK4BKnXffXMT4YYVhZc Jan 23 03:03:22 localhost certmonger[39543]: -----END CERTIFICATE----- Jan 23 03:03:22 localhost certmonger[39543]: ". Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Certificate submission still ongoing. Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Certificate submission postprocessing complete. Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Child status = 0. Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Child output: Jan 23 03:03:22 localhost certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ng2hcR1yPETCMUGK4BKnXffXMT4YYVhZc\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:22 localhost certmonger[38898]: " Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:22 localhost certmonger[38898]: MIIFVDCCA7ygAwIBAgIQaIGhniRpZCRc7co/Egiz7TANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:22 localhost certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:22 localhost certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDMyMVoXDTI4MDEyNDA4MDMyMVowOzERMA8GA1UECgwI Jan 23 03:03:22 localhost certmonger[38898]: T09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTU5MzEwMi5zdG9yYWdlLm9vby50ZXN0 Jan 23 03:03:22 localhost certmonger[38898]: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0LnlkjrZ41cUOw7CW0Uk Jan 23 03:03:22 localhost certmonger[38898]: YiADQFG3F2zPtKBERrj3J2clnxfNYRsvvtNhE212xDEA1XwDi1bMKK2aqUHSG+As Jan 23 03:03:22 localhost certmonger[38898]: FFxSn9U284ECni9wIC2atJ3JWX/qD0gVnS2/1jIFdiAKhoWB3E+CCmVPm9hG7EUK Jan 23 03:03:22 localhost certmonger[38898]: O4ktZEogD6sZPQH/f54z0Y3yfjr7p9qW3zHeDrYuQTwVUxFP5p4qssWmz/kAsQNZ Jan 23 03:03:22 localhost certmonger[38898]: dJHkbZuU+nkgVxgdnzklSyhVhJysb6P0bTfYCJpi353n+g2KfoPm8xwQttgEJlsS Jan 23 03:03:22 localhost certmonger[38898]: 5UETMNP71uyjDkdIodFAwpC1iJwt0to/j36S49jA9SCCUEBmNC7CGWTdK42MsNAS Jan 23 03:03:22 localhost certmonger[38898]: DQIDAQABo4IB2jCCAdYwHwYDVR0jBBgwFoAU9rnfT/lUfXM9lKGS0+tarXcs8jgw Jan 23 03:03:22 localhost certmonger[38898]: OgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50 Jan 23 03:03:22 localhost certmonger[38898]: ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB Jan 23 03:03:22 localhost certmonger[38898]: BggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50 Jan 23 03:03:22 localhost certmonger[38898]: ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex Jan 23 03:03:22 localhost certmonger[38898]: HjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU6fEboT84 Jan 23 03:03:22 localhost certmonger[38898]: 5jUegDsd/2CIT1RLK9IwgbMGA1UdEQSBqzCBqIIdbnAwMDA1NTkzMTAyLnN0b3Jh Jan 23 03:03:22 localhost certmonger[38898]: Z2Uub29vLnRlc3SgOwYKKwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTU5MzEwMi5z Jan 23 03:03:22 localhost certmonger[38898]: dG9yYWdlLm9vby50ZXN0QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRF Jan 23 03:03:22 localhost certmonger[38898]: U1ShMDAuoAMCAQGhJzAlGwRIVFRQGx1ucDAwMDU1OTMxMDIuc3RvcmFnZS5vb28u Jan 23 03:03:22 localhost certmonger[38898]: dGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAu81T+abzS0Ob6L6H8Z+tLDa95LoB/fxR Jan 23 03:03:22 localhost certmonger[38898]: oPGZ/BaZhJa2wc4dkR27Z1LIs6sBgrtyJ9jFb7Q7AhsDFbDdx5k2mEDgFN2W/VX0 Jan 23 03:03:22 localhost certmonger[38898]: n76NntdnLXPtwWCzJGEzskJRHMkz7KBQqCsFPOcf/yu3bhMLmhvEPFXOc6S1Bngv Jan 23 03:03:22 localhost certmonger[38898]: ePb488uPqGRJ1NxT630rj5ipQvy217lwNzAKUOeInH8DyjWKEKuNC6filI31Yn2j Jan 23 03:03:22 localhost certmonger[38898]: 5VBk26lLjWQYtlTs76o1+eD7Ekzgn0neBK9IwY7qVe2YsgjAiKNE++1Kp9N44snW Jan 23 03:03:22 localhost certmonger[38898]: 60vZdygdClDD9XC9u5k4QmI0vSMxOkkTNvaWTGQOQE9ajWwULLWaaOCYwhe/7+Lx Jan 23 03:03:22 localhost certmonger[38898]: ERJY0LQU/WgdKgFK1Hgn+sZ4aOLwhrrHUBiR2GlEyQk760yDPtN2DwNEpVxDoF1w Jan 23 03:03:22 localhost certmonger[38898]: 04qOa7wGP/k8vfKMSJVgLVyEbrtYmQyH0qZOMNcJUuOopFuENN8wR6q1ZAPgr+x8 Jan 23 03:03:22 localhost certmonger[38898]: g2hcR1yPETCMUGK4BKnXffXMT4YYVhZc Jan 23 03:03:22 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:22 localhost certmonger[38898]: ". Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] No hooks set for pre-save command. Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost certmonger[39551]: Certificate in file "/etc/pki/tls/certs/httpd-storage.crt" issued by CA and saved. Jan 23 03:03:22 localhost certmonger[38898]: 2026-01-23 08:03:22 [38898] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:22 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:22 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost python3[39567]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005593102.storagemgmt.ooo.test'] principal=['HTTP/np0005593102.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:22 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.storagemgmt.ooo.test" for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.storagemgmt.ooo.test Jan 23 03:03:23 localhost certmonger[39577]: " for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593102.storagemgmt.ooo.test@OOO.TEST Jan 23 03:03:23 localhost certmonger[39577]: " for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:23 localhost certmonger[39577]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLnN0b3JhZ2VtZ210 Jan 23 03:03:23 localhost certmonger[39577]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArA9OgWbH Jan 23 03:03:23 localhost certmonger[39577]: HRLJ6wTC1Aa8l1gnPzNPfKT0fRw2t8SfXW/18F88wUA31nWtfi75riF27CtcBpSd Jan 23 03:03:23 localhost certmonger[39577]: Dz7Jl8hCjb8ubcgU04XFOxzPabbU5Ay5WTNfweSRh63W/kURm46rvSK6woNt/Rqh Jan 23 03:03:23 localhost certmonger[39577]: jdAlJhinXYTbgPowt/EcnjYxy5m9FKXzCQiTgPYdTjRCHMZucraqFetaejZEb0At Jan 23 03:03:23 localhost certmonger[39577]: jaFSr5A937lKZgoLVcgM9C+Ub42MOu4fRMeoZW0Pk0S2NYF0Kc2EmLWqVoiNIFiK Jan 23 03:03:23 localhost certmonger[39577]: TGtcwDLbhyf+Qo0BHSYuTcHFSRSCxXRh/S8jymzqwyAeQHxlkKLDqvdE7DFAnLtn Jan 23 03:03:23 localhost certmonger[39577]: njGH0qXCDQnIcwIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 03:03:23 localhost certmonger[39577]: ADIAMwAwADgAMAAzADIAMzCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Jan 23 03:03:23 localhost certmonger[39577]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29v Jan 23 03:03:23 localhost certmonger[39577]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU5MzEwMi5zdG9yYWdl Jan 23 03:03:23 localhost certmonger[39577]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Jan 23 03:03:23 localhost certmonger[39577]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAyLnN0b3JhZ2VtZ210Lm9v Jan 23 03:03:23 localhost certmonger[39577]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Jan 23 03:03:23 localhost certmonger[39577]: AjAAMB0GA1UdDgQWBBR/aUTGUNdFOiaSyDmh6nwb4cz8gzANBgkqhkiG9w0BAQsF Jan 23 03:03:23 localhost certmonger[39577]: AAOCAQEACLwLirBsB/AlWFj7bywk3WBzXmRAQ4SUvCs/VptL0AD+dWTRVT9kpYxv Jan 23 03:03:23 localhost certmonger[39577]: Ts7Pt8TNhdunq+8hPgMvG5UzpCvJ3xx76oXb8Tb+V963kjIjIhdNeBPk3WA/WNpq Jan 23 03:03:23 localhost certmonger[39577]: s64KpDOESL0119wVC2p7JAOgbbVxw/EbsDvBy/mEnBCjhQZbyIVZ/jp5oKHFHqwj Jan 23 03:03:23 localhost certmonger[39577]: JfbscTXYkghJS8djGZaNlvy8WpE8CJru30A37IIcLgICCh4BkiBo5bFsQBPxD5QW Jan 23 03:03:23 localhost certmonger[39577]: 6Sne+YWKayv9zHkFDzTOigHLECjQcptBAqjfQ3A96H35eTWRfRbth0M2kFS6Lgom Jan 23 03:03:23 localhost certmonger[39577]: RqwOJK6xfbgTSU1OBtyNYAfcwHiJ2Q== Jan 23 03:03:23 localhost certmonger[39577]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:23 localhost certmonger[39577]: " for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArA9OgWbHHRLJ6wTC1Aa8l1gnPzNPfKT0fRw2t8SfXW/18F88wUA31nWtfi75riF27CtcBpSdDz7Jl8hCjb8ubcgU04XFOxzPabbU5Ay5WTNfweSRh63W/kURm46rvSK6woNt/RqhjdAlJhinXYTbgPowt/EcnjYxy5m9FKXzCQiTgPYdTjRCHMZucraqFetaejZEb0AtjaFSr5A937lKZgoLVcgM9C+Ub42MOu4fRMeoZW0Pk0S2NYF0Kc2EmLWqVoiNIFiKTGtcwDLbhyf+Qo0BHSYuTcHFSRSCxXRh/S8jymzqwyAeQHxlkKLDqvdE7DFAnLtnnjGH0qXCDQnIcwIDAQAB" for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:23 localhost certmonger[39577]: 2026-01-23 08:03:23 [39577] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:23 localhost certmonger[38898]: 2026-01-23 08:03:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost certmonger[39577]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:23 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost certmonger[39577]: Certificate: "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" Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Certificate submission still ongoing. Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Certificate submission attempt complete. Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Child status = 0. Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Child output: Jan 23 03:03:24 localhost certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:24 localhost certmonger[38898]: MIIFZTCCA82gAwIBAgIRAKzB2ekUWZPY4bWDYwwmRmcwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:24 localhost certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:24 localhost certmonger[38898]: cml0eTAeFw0yNjAxMjMwODAzMjRaFw0yODAxMjQwODAzMjRaMD8xETAPBgNVBAoM Jan 23 03:03:24 localhost certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29v Jan 23 03:03:24 localhost certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCsD06BZscdEsnr Jan 23 03:03:24 localhost certmonger[38898]: BMLUBryXWCc/M098pPR9HDa3xJ9db/XwXzzBQDfWda1+LvmuIXbsK1wGlJ0PPsmX Jan 23 03:03:24 localhost certmonger[38898]: yEKNvy5tyBTThcU7HM9pttTkDLlZM1/B5JGHrdb+RRGbjqu9IrrCg239GqGN0CUm Jan 23 03:03:24 localhost certmonger[38898]: GKddhNuA+jC38RyeNjHLmb0UpfMJCJOA9h1ONEIcxm5ytqoV61p6NkRvQC2NoVKv Jan 23 03:03:24 localhost certmonger[38898]: kD3fuUpmCgtVyAz0L5RvjYw67h9Ex6hlbQ+TRLY1gXQpzYSYtapWiI0gWIpMa1zA Jan 23 03:03:24 localhost certmonger[38898]: MtuHJ/5CjQEdJi5NwcVJFILFdGH9LyPKbOrDIB5AfGWQosOq90TsMUCcu2eeMYfS Jan 23 03:03:24 localhost certmonger[38898]: pcINCchzAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 03:03:24 localhost certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:24 localhost certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 03:03:24 localhost certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:24 localhost certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 03:03:24 localhost certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTt Jan 23 03:03:24 localhost certmonger[38898]: kKuTVPg7FU5mSjQQ4n1Gc9o1JjCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDIu Jan 23 03:03:24 localhost certmonger[38898]: c3RvcmFnZW1nbXQub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Jan 23 03:03:24 localhost certmonger[38898]: NTU5MzEwMi5zdG9yYWdlbWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Jan 23 03:03:24 localhost certmonger[38898]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAy Jan 23 03:03:24 localhost certmonger[38898]: LnN0b3JhZ2VtZ210Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQCO5Qu3nuIr Jan 23 03:03:24 localhost certmonger[38898]: C2qYInoCKMRMvO+nCA5Nk7tCMwYrwFHGULX2PwGhjcjNs6OdMK6P2xJAb9rZ3QaZ Jan 23 03:03:24 localhost certmonger[38898]: FRLnfBrizZt+7o9UcGuzrfGsjXMl0y8/WWpPN/ld1kIGbo+BLMnRO/60FXvooT3e Jan 23 03:03:24 localhost certmonger[38898]: p+vc4pZZHfmd38JSWIuLvvudPp3+SSQDWWEbZv+yns80v8OyOIh2HxEKng7N3NR1 Jan 23 03:03:24 localhost certmonger[38898]: 03JlfRvCVN611vdCRCzUEafnkhpItgFspSovAcZins8llGhHXqKIRJuGtAO+i/kD Jan 23 03:03:24 localhost certmonger[38898]: lgHnCfNe4+bPnCj7xJKNvvRgqWCiJlwPtPagDN8kVAHhS1CGDJt7lib6uFf9pKOV Jan 23 03:03:24 localhost certmonger[38898]: M0kQFLniuvZ5p9/IZP5KgY5Z6NzVketu5ZYwS+5fCDkRJydJiqMiRRUmO18xbrIj Jan 23 03:03:24 localhost certmonger[38898]: RIZlbmrCHlzmgtHhf/53aCRikKwr2k2PGexYVq0/iirBjlRzQ0VzYK2it0lvcVrZ Jan 23 03:03:24 localhost certmonger[38898]: wzx8ARBsRNdPA79c76Tr56ZQv9u2JW7mvaCLBKJ+7ytZaz5RXG/zTes= Jan 23 03:03:24 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:24 localhost certmonger[38898]: " Jan 23 03:03:24 localhost certmonger[39579]: 2026-01-23 08:03:24 [39579] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:24 localhost certmonger[39579]: MIIFZTCCA82gAwIBAgIRAKzB2ekUWZPY4bWDYwwmRmcwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:24 localhost certmonger[39579]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:24 localhost certmonger[39579]: cml0eTAeFw0yNjAxMjMwODAzMjRaFw0yODAxMjQwODAzMjRaMD8xETAPBgNVBAoM Jan 23 03:03:24 localhost certmonger[39579]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29v Jan 23 03:03:24 localhost certmonger[39579]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCsD06BZscdEsnr Jan 23 03:03:24 localhost certmonger[39579]: BMLUBryXWCc/M098pPR9HDa3xJ9db/XwXzzBQDfWda1+LvmuIXbsK1wGlJ0PPsmX Jan 23 03:03:24 localhost certmonger[39579]: yEKNvy5tyBTThcU7HM9pttTkDLlZM1/B5JGHrdb+RRGbjqu9IrrCg239GqGN0CUm Jan 23 03:03:24 localhost certmonger[39579]: GKddhNuA+jC38RyeNjHLmb0UpfMJCJOA9h1ONEIcxm5ytqoV61p6NkRvQC2NoVKv Jan 23 03:03:24 localhost certmonger[39579]: kD3fuUpmCgtVyAz0L5RvjYw67h9Ex6hlbQ+TRLY1gXQpzYSYtapWiI0gWIpMa1zA Jan 23 03:03:24 localhost certmonger[39579]: MtuHJ/5CjQEdJi5NwcVJFILFdGH9LyPKbOrDIB5AfGWQosOq90TsMUCcu2eeMYfS Jan 23 03:03:24 localhost certmonger[39579]: pcINCchzAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 03:03:24 localhost certmonger[39579]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:24 localhost certmonger[39579]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 03:03:24 localhost certmonger[39579]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:24 localhost certmonger[39579]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 03:03:24 localhost certmonger[39579]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTt Jan 23 03:03:24 localhost certmonger[39579]: kKuTVPg7FU5mSjQQ4n1Gc9o1JjCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDIu Jan 23 03:03:24 localhost certmonger[39579]: c3RvcmFnZW1nbXQub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Jan 23 03:03:24 localhost certmonger[39579]: NTU5MzEwMi5zdG9yYWdlbWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Jan 23 03:03:24 localhost certmonger[39579]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAy Jan 23 03:03:24 localhost certmonger[39579]: LnN0b3JhZ2VtZ210Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQCO5Qu3nuIr Jan 23 03:03:24 localhost certmonger[39579]: C2qYInoCKMRMvO+nCA5Nk7tCMwYrwFHGULX2PwGhjcjNs6OdMK6P2xJAb9rZ3QaZ Jan 23 03:03:24 localhost certmonger[39579]: FRLnfBrizZt+7o9UcGuzrfGsjXMl0y8/WWpPN/ld1kIGbo+BLMnRO/60FXvooT3e Jan 23 03:03:24 localhost certmonger[39579]: p+vc4pZZHfmd38JSWIuLvvudPp3+SSQDWWEbZv+yns80v8OyOIh2HxEKng7N3NR1 Jan 23 03:03:24 localhost certmonger[39579]: 03JlfRvCVN611vdCRCzUEafnkhpItgFspSovAcZins8llGhHXqKIRJuGtAO+i/kD Jan 23 03:03:24 localhost certmonger[39579]: lgHnCfNe4+bPnCj7xJKNvvRgqWCiJlwPtPagDN8kVAHhS1CGDJt7lib6uFf9pKOV Jan 23 03:03:24 localhost certmonger[39579]: M0kQFLniuvZ5p9/IZP5KgY5Z6NzVketu5ZYwS+5fCDkRJydJiqMiRRUmO18xbrIj Jan 23 03:03:24 localhost certmonger[39579]: RIZlbmrCHlzmgtHhf/53aCRikKwr2k2PGexYVq0/iirBjlRzQ0VzYK2it0lvcVrZ Jan 23 03:03:24 localhost certmonger[39579]: wzx8ARBsRNdPA79c76Tr56ZQv9u2JW7mvaCLBKJ+7ytZaz5RXG/zTes= Jan 23 03:03:24 localhost certmonger[39579]: -----END CERTIFICATE----- Jan 23 03:03:24 localhost certmonger[39579]: ". Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Certificate submission still ongoing. Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Certificate submission postprocessing complete. Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Child status = 0. Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Child output: Jan 23 03:03:24 localhost certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nwzx8ARBsRNdPA79c76Tr56ZQv9u2JW7mvaCLBKJ+7ytZaz5RXG/zTes=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:24 localhost certmonger[38898]: " Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:24 localhost certmonger[38898]: MIIFZTCCA82gAwIBAgIRAKzB2ekUWZPY4bWDYwwmRmcwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:24 localhost certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:24 localhost certmonger[38898]: cml0eTAeFw0yNjAxMjMwODAzMjRaFw0yODAxMjQwODAzMjRaMD8xETAPBgNVBAoM Jan 23 03:03:24 localhost certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29v Jan 23 03:03:24 localhost certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCsD06BZscdEsnr Jan 23 03:03:24 localhost certmonger[38898]: BMLUBryXWCc/M098pPR9HDa3xJ9db/XwXzzBQDfWda1+LvmuIXbsK1wGlJ0PPsmX Jan 23 03:03:24 localhost certmonger[38898]: yEKNvy5tyBTThcU7HM9pttTkDLlZM1/B5JGHrdb+RRGbjqu9IrrCg239GqGN0CUm Jan 23 03:03:24 localhost certmonger[38898]: GKddhNuA+jC38RyeNjHLmb0UpfMJCJOA9h1ONEIcxm5ytqoV61p6NkRvQC2NoVKv Jan 23 03:03:24 localhost certmonger[38898]: kD3fuUpmCgtVyAz0L5RvjYw67h9Ex6hlbQ+TRLY1gXQpzYSYtapWiI0gWIpMa1zA Jan 23 03:03:24 localhost certmonger[38898]: MtuHJ/5CjQEdJi5NwcVJFILFdGH9LyPKbOrDIB5AfGWQosOq90TsMUCcu2eeMYfS Jan 23 03:03:24 localhost certmonger[38898]: pcINCchzAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 03:03:24 localhost certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:24 localhost certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 03:03:24 localhost certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:24 localhost certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 03:03:24 localhost certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTt Jan 23 03:03:24 localhost certmonger[38898]: kKuTVPg7FU5mSjQQ4n1Gc9o1JjCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDIu Jan 23 03:03:24 localhost certmonger[38898]: c3RvcmFnZW1nbXQub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Jan 23 03:03:24 localhost certmonger[38898]: NTU5MzEwMi5zdG9yYWdlbWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Jan 23 03:03:24 localhost certmonger[38898]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAy Jan 23 03:03:24 localhost certmonger[38898]: LnN0b3JhZ2VtZ210Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQCO5Qu3nuIr Jan 23 03:03:24 localhost certmonger[38898]: C2qYInoCKMRMvO+nCA5Nk7tCMwYrwFHGULX2PwGhjcjNs6OdMK6P2xJAb9rZ3QaZ Jan 23 03:03:24 localhost certmonger[38898]: FRLnfBrizZt+7o9UcGuzrfGsjXMl0y8/WWpPN/ld1kIGbo+BLMnRO/60FXvooT3e Jan 23 03:03:24 localhost certmonger[38898]: p+vc4pZZHfmd38JSWIuLvvudPp3+SSQDWWEbZv+yns80v8OyOIh2HxEKng7N3NR1 Jan 23 03:03:24 localhost certmonger[38898]: 03JlfRvCVN611vdCRCzUEafnkhpItgFspSovAcZins8llGhHXqKIRJuGtAO+i/kD Jan 23 03:03:24 localhost certmonger[38898]: lgHnCfNe4+bPnCj7xJKNvvRgqWCiJlwPtPagDN8kVAHhS1CGDJt7lib6uFf9pKOV Jan 23 03:03:24 localhost certmonger[38898]: M0kQFLniuvZ5p9/IZP5KgY5Z6NzVketu5ZYwS+5fCDkRJydJiqMiRRUmO18xbrIj Jan 23 03:03:24 localhost certmonger[38898]: RIZlbmrCHlzmgtHhf/53aCRikKwr2k2PGexYVq0/iirBjlRzQ0VzYK2it0lvcVrZ Jan 23 03:03:24 localhost certmonger[38898]: wzx8ARBsRNdPA79c76Tr56ZQv9u2JW7mvaCLBKJ+7ytZaz5RXG/zTes= Jan 23 03:03:24 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:24 localhost certmonger[38898]: ". Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] No hooks set for pre-save command. Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost certmonger[39587]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Jan 23 03:03:24 localhost certmonger[38898]: 2026-01-23 08:03:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080323 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:24 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost python3[39603]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005593102.internalapi.ooo.test'] principal=['HTTP/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:25 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 03:03:25 localhost certmonger[39613]: " for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 03:03:25 localhost certmonger[39613]: " for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:25 localhost certmonger[39613]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 03:03:25 localhost certmonger[39613]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0xW3isqP Jan 23 03:03:25 localhost certmonger[39613]: FWNQWvV1raa8XhJGkWWKMYpqRQ7Y7ljtz8VEhinqhLej0yq1P62srLAQoIywoq6m Jan 23 03:03:25 localhost certmonger[39613]: gGP55saQM1ZUZdQXLMnPToqgel7uzG/eFwJobVBhRdvylT66+G2UTUwuVhGE8Vk8 Jan 23 03:03:25 localhost certmonger[39613]: uzqX8I2KXY9cK9Ux2lDtrtZtaI2n/bEN3QwpH8MxiLaWK6k3j+4BLvyBS2qT5zw5 Jan 23 03:03:25 localhost certmonger[39613]: cDTXlsUoUV3mIyosPZGBJMMqFsDRMOHYl6I30UUOJO/Nw3xcLSKM5pEAtQil9MZX Jan 23 03:03:25 localhost certmonger[39613]: IEOzYbbpwPJCCP3WLjNOSmEuOTzqNVdOcgm9zol+/R4Qvwq38X8WV3XA/ME0HMg+ Jan 23 03:03:25 localhost certmonger[39613]: +73lcBiFSFK17QIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 03:03:25 localhost certmonger[39613]: ADIAMwAwADgAMAAzADIANTCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Jan 23 03:03:25 localhost certmonger[39613]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 03:03:25 localhost certmonger[39613]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU5MzEwMi5pbnRlcm5h Jan 23 03:03:25 localhost certmonger[39613]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Jan 23 03:03:25 localhost certmonger[39613]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAyLmludGVybmFsYXBpLm9v Jan 23 03:03:25 localhost certmonger[39613]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Jan 23 03:03:25 localhost certmonger[39613]: AjAAMB0GA1UdDgQWBBR4+vFHKLavV6G39p0ZLeZB5HJ6njANBgkqhkiG9w0BAQsF Jan 23 03:03:25 localhost certmonger[39613]: AAOCAQEAgfAjTfeJ3SW9TmTzDXxyFfo2y4ziPLt7X6ElqR1YP2oWWr58Ho+PVVEa Jan 23 03:03:25 localhost certmonger[39613]: I2ATlE6xEoIb4Qhl6c/1w/IdWAu38VANVW6Q5Ld5Ndyi2ZRgozSbS7S5gohAsK1s Jan 23 03:03:25 localhost certmonger[39613]: MyExx7YO2vLmH7Dkb6tfhB0e7Ui4QRxMV1fW4KBEezpB7X3rxu4LgHumMfOt69cH Jan 23 03:03:25 localhost certmonger[39613]: rYCwboMAU71pReAuUiX+2YreNoNeEF72mrCV8vKXW0dsbLXN1cuYKHjn1daF9foK Jan 23 03:03:25 localhost certmonger[39613]: Kr/0OTKaCk+j+7Gt0AVrcQoFnSj/SSVNdsfMrt0FfXfqUY0OGwk2I9QwToiZjQ1K Jan 23 03:03:25 localhost certmonger[39613]: Q5Za1qchnE4+3G7/aWUvGwHrHk4I0Q== Jan 23 03:03:25 localhost certmonger[39613]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:25 localhost certmonger[39613]: " for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0xW3isqPFWNQWvV1raa8XhJGkWWKMYpqRQ7Y7ljtz8VEhinqhLej0yq1P62srLAQoIywoq6mgGP55saQM1ZUZdQXLMnPToqgel7uzG/eFwJobVBhRdvylT66+G2UTUwuVhGE8Vk8uzqX8I2KXY9cK9Ux2lDtrtZtaI2n/bEN3QwpH8MxiLaWK6k3j+4BLvyBS2qT5zw5cDTXlsUoUV3mIyosPZGBJMMqFsDRMOHYl6I30UUOJO/Nw3xcLSKM5pEAtQil9MZXIEOzYbbpwPJCCP3WLjNOSmEuOTzqNVdOcgm9zol+/R4Qvwq38X8WV3XA/ME0HMg++73lcBiFSFK17QIDAQAB" for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:25 localhost certmonger[39613]: 2026-01-23 08:03:25 [39613] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:25 localhost certmonger[38898]: 2026-01-23 08:03:25 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost certmonger[39613]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[39613]: Certificate: "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" Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Certificate submission still ongoing. Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Certificate submission attempt complete. Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Child status = 0. Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Child output: Jan 23 03:03:26 localhost certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38898]: MIIFZTCCA82gAwIBAgIRANFVLS7nC7GTmd8puEAMyRcwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:26 localhost certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:26 localhost certmonger[38898]: cml0eTAeFw0yNjAxMjMwODAzMjVaFw0yODAxMjQwODAzMjVaMD8xETAPBgNVBAoM Jan 23 03:03:26 localhost certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 03:03:26 localhost certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDTFbeKyo8VY1Ba Jan 23 03:03:26 localhost certmonger[38898]: 9XWtprxeEkaRZYoximpFDtjuWO3PxUSGKeqEt6PTKrU/rayssBCgjLCirqaAY/nm Jan 23 03:03:26 localhost certmonger[38898]: xpAzVlRl1Bcsyc9OiqB6Xu7Mb94XAmhtUGFF2/KVPrr4bZRNTC5WEYTxWTy7Opfw Jan 23 03:03:26 localhost certmonger[38898]: jYpdj1wr1THaUO2u1m1ojaf9sQ3dDCkfwzGItpYrqTeP7gEu/IFLapPnPDlwNNeW Jan 23 03:03:26 localhost certmonger[38898]: xShRXeYjKiw9kYEkwyoWwNEw4diXojfRRQ4k783DfFwtIozmkQC1CKX0xlcgQ7Nh Jan 23 03:03:26 localhost certmonger[38898]: tunA8kII/dYuM05KYS45POo1V05yCb3OiX79HhC/CrfxfxZXdcD8wTQcyD77veVw Jan 23 03:03:26 localhost certmonger[38898]: GIVIUrXtAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 03:03:26 localhost certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:26 localhost certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 03:03:26 localhost certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:26 localhost certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 03:03:26 localhost certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSX Jan 23 03:03:26 localhost certmonger[38898]: XSYkGPcFeSG/tndiSyWSSUU+3TCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDIu Jan 23 03:03:26 localhost certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Jan 23 03:03:26 localhost certmonger[38898]: NTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Jan 23 03:03:26 localhost certmonger[38898]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAy Jan 23 03:03:26 localhost certmonger[38898]: LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQDRndQuiPgs Jan 23 03:03:26 localhost certmonger[38898]: yD7UuIGOdjTc+eOuIt7pxIaCzTKyxgoPWJlIUbyLgGztwXiD8eW7SBx6NaMiqi4O Jan 23 03:03:26 localhost certmonger[38898]: EnN0kXm9Kj1GqBt/jpF+Gm11QJRNH3xnkWaZ08T/FskpwJczqQAKB6BOH5gwxGpp Jan 23 03:03:26 localhost certmonger[38898]: Q+xqQ1jvI8pcEufl9A+orREhSYvaMpXQ6AK7Mgxrbxq8goNyP2KrBEuyUBjUFTME Jan 23 03:03:26 localhost certmonger[38898]: hdlaTzbOYtve+5Zpp6749WB1PSaf1lD8q3v1skpr0xnVRFaHQDFufSZSuDElFKec Jan 23 03:03:26 localhost certmonger[38898]: Lw50i2nC9YraDwH/zuca691fwmYihWnG3DDYFA0vVnkEAhw+qCGp5IZaw+GNkLbj Jan 23 03:03:26 localhost certmonger[38898]: miBy8F9GCqyFRVjnEGTsaYDfNkEsHo56pu6Rm/38luNpIjrna9mmOiZBqv6wEvVv Jan 23 03:03:26 localhost certmonger[38898]: QVzGyApFbWvTzitGqb4EkTNtD3dqysTQpaG8xakhEYmDO0kqGbVCUhfZagubirRb Jan 23 03:03:26 localhost certmonger[38898]: H+OHSjLjweKICKAmrXAsge31kyU14QPSy2wyrVVV9XRtcrBNjtdpv4w= Jan 23 03:03:26 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38898]: " Jan 23 03:03:26 localhost certmonger[39615]: 2026-01-23 08:03:26 [39615] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[39615]: MIIFZTCCA82gAwIBAgIRANFVLS7nC7GTmd8puEAMyRcwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:26 localhost certmonger[39615]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:26 localhost certmonger[39615]: cml0eTAeFw0yNjAxMjMwODAzMjVaFw0yODAxMjQwODAzMjVaMD8xETAPBgNVBAoM Jan 23 03:03:26 localhost certmonger[39615]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 03:03:26 localhost certmonger[39615]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDTFbeKyo8VY1Ba Jan 23 03:03:26 localhost certmonger[39615]: 9XWtprxeEkaRZYoximpFDtjuWO3PxUSGKeqEt6PTKrU/rayssBCgjLCirqaAY/nm Jan 23 03:03:26 localhost certmonger[39615]: xpAzVlRl1Bcsyc9OiqB6Xu7Mb94XAmhtUGFF2/KVPrr4bZRNTC5WEYTxWTy7Opfw Jan 23 03:03:26 localhost certmonger[39615]: jYpdj1wr1THaUO2u1m1ojaf9sQ3dDCkfwzGItpYrqTeP7gEu/IFLapPnPDlwNNeW Jan 23 03:03:26 localhost certmonger[39615]: xShRXeYjKiw9kYEkwyoWwNEw4diXojfRRQ4k783DfFwtIozmkQC1CKX0xlcgQ7Nh Jan 23 03:03:26 localhost certmonger[39615]: tunA8kII/dYuM05KYS45POo1V05yCb3OiX79HhC/CrfxfxZXdcD8wTQcyD77veVw Jan 23 03:03:26 localhost certmonger[39615]: GIVIUrXtAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 03:03:26 localhost certmonger[39615]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:26 localhost certmonger[39615]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 03:03:26 localhost certmonger[39615]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:26 localhost certmonger[39615]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 03:03:26 localhost certmonger[39615]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSX Jan 23 03:03:26 localhost certmonger[39615]: XSYkGPcFeSG/tndiSyWSSUU+3TCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDIu Jan 23 03:03:26 localhost certmonger[39615]: aW50ZXJuYWxhcGkub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Jan 23 03:03:26 localhost certmonger[39615]: NTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Jan 23 03:03:26 localhost certmonger[39615]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAy Jan 23 03:03:26 localhost certmonger[39615]: LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQDRndQuiPgs Jan 23 03:03:26 localhost certmonger[39615]: yD7UuIGOdjTc+eOuIt7pxIaCzTKyxgoPWJlIUbyLgGztwXiD8eW7SBx6NaMiqi4O Jan 23 03:03:26 localhost certmonger[39615]: EnN0kXm9Kj1GqBt/jpF+Gm11QJRNH3xnkWaZ08T/FskpwJczqQAKB6BOH5gwxGpp Jan 23 03:03:26 localhost certmonger[39615]: Q+xqQ1jvI8pcEufl9A+orREhSYvaMpXQ6AK7Mgxrbxq8goNyP2KrBEuyUBjUFTME Jan 23 03:03:26 localhost certmonger[39615]: hdlaTzbOYtve+5Zpp6749WB1PSaf1lD8q3v1skpr0xnVRFaHQDFufSZSuDElFKec Jan 23 03:03:26 localhost certmonger[39615]: Lw50i2nC9YraDwH/zuca691fwmYihWnG3DDYFA0vVnkEAhw+qCGp5IZaw+GNkLbj Jan 23 03:03:26 localhost certmonger[39615]: miBy8F9GCqyFRVjnEGTsaYDfNkEsHo56pu6Rm/38luNpIjrna9mmOiZBqv6wEvVv Jan 23 03:03:26 localhost certmonger[39615]: QVzGyApFbWvTzitGqb4EkTNtD3dqysTQpaG8xakhEYmDO0kqGbVCUhfZagubirRb Jan 23 03:03:26 localhost certmonger[39615]: H+OHSjLjweKICKAmrXAsge31kyU14QPSy2wyrVVV9XRtcrBNjtdpv4w= Jan 23 03:03:26 localhost certmonger[39615]: -----END CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[39615]: ". Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Certificate submission still ongoing. Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Certificate submission postprocessing complete. Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Child status = 0. Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Child output: Jan 23 03:03:26 localhost certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFZTCCA82gAwIBAgIRANFVLS7nC7GTmd8puEAMyRcwDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAxMjMwODAzMjVaFw0yODAxMjQwODAzMjVaMD8xETAPBgNVBAoM\nCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v\nLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDTFbeKyo8VY1Ba\n9XWtprxeEkaRZYoximpFDtjuWO3PxUSGKeqEt6PTKrU/rayssBCgjLCirqaAY/nm\nxpAzVlRl1Bcsyc9OiqB6Xu7Mb94XAmhtUGFF2/KVPrr4bZRNTC5WEYTxWTy7Opfw\njYpdj1wr1THaUO2u1m1ojaf9sQ3dDCkfwzGItpYrqTeP7gEu/IFLapPnPDlwNNeW\nxShRXeYjKiw9kYEkwyoWwNEw4diXojfRRQ4k783DfFwtIozmkQC1CKX0xlcgQ7Nh\ntunA8kII/dYuM05KYS45POo1V05yCb3OiX79HhC/CrfxfxZXdcD8wTQcyD77veVw\nGIVIUrXtAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt\ndyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB\nBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp\ncGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSX\nXSYkGPcFeSG/tndiSyWSSUU+3TCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDIu\naW50ZXJuYWxhcGkub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw\nNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg\nRDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAy\nLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQDRndQuiPgs\nyD7UuIGOdjTc+eOuIt7pxIaCzTKyxgoPWJlIUbyLgGztwXiD8eW7SBx6NaMiqi4O\nEnN0kXm9Kj1GqBt/jpF+Gm11QJRNH3xnkWaZ08T/FskpwJczqQAKB6BOH5gwxGpp\nQ+xqQ1jvI8pcEufl9A+orREhSYvaMpXQ6AK7Mgxrbxq8goNyP2KrBEuyUBjUFTME\nhdlaTzbOYtve+5Zpp6749WB1PSaf1lD8q3v1skpr0xnVRFaHQDFufSZSuDElFKec\nLw50i2nC9YraDwH/zuca691fwmYihWnG3DDYFA0vVnkEAhw+qCGp5IZaw+GNkLbj\nmiBy8F9GCqyFRVjnEGTsaYDfNkEsHo56pu6Rm/38luNpIjrna9mmOiZBqv6wEvVv\nQVzGyApFbWvTzitGqb4EkTNtD3dqysTQpaG8xakhEYmDO0kqGbVCUhfZagubirRb\nH+OHSjLjweKICKAmrXAsge31kyU14QPSy2wyrVVV9XRtcrBNjtdpv4w=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:26 localhost certmonger[38898]: " Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38898]: MIIFZTCCA82gAwIBAgIRANFVLS7nC7GTmd8puEAMyRcwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:26 localhost certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:26 localhost certmonger[38898]: cml0eTAeFw0yNjAxMjMwODAzMjVaFw0yODAxMjQwODAzMjVaMD8xETAPBgNVBAoM Jan 23 03:03:26 localhost certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 03:03:26 localhost certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDTFbeKyo8VY1Ba Jan 23 03:03:26 localhost certmonger[38898]: 9XWtprxeEkaRZYoximpFDtjuWO3PxUSGKeqEt6PTKrU/rayssBCgjLCirqaAY/nm Jan 23 03:03:26 localhost certmonger[38898]: xpAzVlRl1Bcsyc9OiqB6Xu7Mb94XAmhtUGFF2/KVPrr4bZRNTC5WEYTxWTy7Opfw Jan 23 03:03:26 localhost certmonger[38898]: jYpdj1wr1THaUO2u1m1ojaf9sQ3dDCkfwzGItpYrqTeP7gEu/IFLapPnPDlwNNeW Jan 23 03:03:26 localhost certmonger[38898]: xShRXeYjKiw9kYEkwyoWwNEw4diXojfRRQ4k783DfFwtIozmkQC1CKX0xlcgQ7Nh Jan 23 03:03:26 localhost certmonger[38898]: tunA8kII/dYuM05KYS45POo1V05yCb3OiX79HhC/CrfxfxZXdcD8wTQcyD77veVw Jan 23 03:03:26 localhost certmonger[38898]: GIVIUrXtAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 03:03:26 localhost certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:26 localhost certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 03:03:26 localhost certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:26 localhost certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 03:03:26 localhost certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSX Jan 23 03:03:26 localhost certmonger[38898]: XSYkGPcFeSG/tndiSyWSSUU+3TCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDIu Jan 23 03:03:26 localhost certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Jan 23 03:03:26 localhost certmonger[38898]: NTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Jan 23 03:03:26 localhost certmonger[38898]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAy Jan 23 03:03:26 localhost certmonger[38898]: LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQDRndQuiPgs Jan 23 03:03:26 localhost certmonger[38898]: yD7UuIGOdjTc+eOuIt7pxIaCzTKyxgoPWJlIUbyLgGztwXiD8eW7SBx6NaMiqi4O Jan 23 03:03:26 localhost certmonger[38898]: EnN0kXm9Kj1GqBt/jpF+Gm11QJRNH3xnkWaZ08T/FskpwJczqQAKB6BOH5gwxGpp Jan 23 03:03:26 localhost certmonger[38898]: Q+xqQ1jvI8pcEufl9A+orREhSYvaMpXQ6AK7Mgxrbxq8goNyP2KrBEuyUBjUFTME Jan 23 03:03:26 localhost certmonger[38898]: hdlaTzbOYtve+5Zpp6749WB1PSaf1lD8q3v1skpr0xnVRFaHQDFufSZSuDElFKec Jan 23 03:03:26 localhost certmonger[38898]: Lw50i2nC9YraDwH/zuca691fwmYihWnG3DDYFA0vVnkEAhw+qCGp5IZaw+GNkLbj Jan 23 03:03:26 localhost certmonger[38898]: miBy8F9GCqyFRVjnEGTsaYDfNkEsHo56pu6Rm/38luNpIjrna9mmOiZBqv6wEvVv Jan 23 03:03:26 localhost certmonger[38898]: QVzGyApFbWvTzitGqb4EkTNtD3dqysTQpaG8xakhEYmDO0kqGbVCUhfZagubirRb Jan 23 03:03:26 localhost certmonger[38898]: H+OHSjLjweKICKAmrXAsge31kyU14QPSy2wyrVVV9XRtcrBNjtdpv4w= Jan 23 03:03:26 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38898]: ". Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] No hooks set for pre-save command. Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[39623]: Certificate in file "/etc/pki/tls/certs/httpd-internal_api.crt" issued by CA and saved. Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:26 localhost auditd[726]: auditd queue full reporting limit reached - ending dropped event notifications Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07aa6cf4-df94-4e83-a30a-1bfd767b1ab8 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87a7b787-4fd7-483f-9155-16163453f518 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost python3[39639]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005593102.external.ooo.test'] principal=['HTTP/np0005593102.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38898]: 2026-01-23 08:03:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 081f1d77-80a0-4904-aea4-3419cfcb3ebe Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61cbaa9-018c-42ad-bf2b-dcc6c3e2bc8d Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 88cfd95c-ec9c-4cc3-8ae7-756dcdf22912 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8ae349c5-0936-4278-8cd8-714d4ed8f9bb Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.external.ooo.test" for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.external.ooo.test Jan 23 03:03:27 localhost certmonger[39649]: " for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593102.external.ooo.test@OOO.TEST Jan 23 03:03:27 localhost certmonger[39649]: " for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:27 localhost certmonger[39649]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTkzMTAyLmV4dGVybmFsLm9v Jan 23 03:03:27 localhost certmonger[39649]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvcdm76UHAFxB Jan 23 03:03:27 localhost certmonger[39649]: Fl698YkYA1xaSwszLOKynoagJ0rOLiTOaVnWGYVoWXEuAxPgdNj/1Ih1uvIsYCtl Jan 23 03:03:27 localhost certmonger[39649]: SoLktgnzCNBLok0NZus4oAWclvCsIgfYmftWkWanpkImt0JcE3XKFgmKHTHPoMn8 Jan 23 03:03:27 localhost certmonger[39649]: wiDXVFFrDpC+xHcwqyGPK/4bZ04z0DGrMnjsZsoTDTl5GFkNEYggtHdlYVpNWzk4 Jan 23 03:03:27 localhost certmonger[39649]: jlh9C3FKj/dzpK7ycRhk9ag4zRL1f8fJ42mvxWHz75NecsDjW/tJAUeYUk/KlVu5 Jan 23 03:03:27 localhost certmonger[39649]: CFDxHYzsQEyUOT/xXEhHk5pxGtBTUDx3FWc5x7fEdXF7xmw1s1VT4KXecjtACpNx Jan 23 03:03:27 localhost certmonger[39649]: W3WzsvJqswIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIA Jan 23 03:03:27 localhost certmonger[39649]: MwAwADgAMAAzADIANjCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Jan 23 03:03:27 localhost certmonger[39649]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDIuZXh0ZXJuYWwub29vLnRlc3Sg Jan 23 03:03:27 localhost certmonger[39649]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEwMi5leHRlcm5hbC5vb28u Jan 23 03:03:27 localhost certmonger[39649]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Jan 23 03:03:27 localhost certmonger[39649]: oSgwJhsESFRUUBsebnAwMDA1NTkzMTAyLmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Jan 23 03:03:27 localhost certmonger[39649]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Jan 23 03:03:27 localhost certmonger[39649]: BBSloM78h/FZ5zFtwMJd0j4e1XdlTzANBgkqhkiG9w0BAQsFAAOCAQEALgz9VO7Y Jan 23 03:03:27 localhost certmonger[39649]: /kDK5dLBeGAzaSSH0DgAThgLvv4xHX2y3IqR4QFMvYPo6BLBllR2MDXf1dP5/0wm Jan 23 03:03:27 localhost certmonger[39649]: rzo5L9DvUlZc7wNdRHTn48hXOyFF5fEeJz19aOUA1gD8X5/cVdn0dZpZDn9ZkKRk Jan 23 03:03:27 localhost certmonger[39649]: 7WQTZCTOwnHo3SuI3uMbugDlZB+1OGrmi9V9Pg/Wg7RVU/jYm8FqO3Bht2n9Pkmm Jan 23 03:03:27 localhost certmonger[39649]: ZogH23FvQsiZPPjfnkwEfMGY2AzBnnYkCyij18ex6vSCuZoG9LynHsTgmeCCoMKB Jan 23 03:03:27 localhost certmonger[39649]: wfRy6OJmz2mzyBxU/+1sIcuJkqo5Oh2oYMErfAyEqx27EWqhyMZeDAkOBRpujYnZ Jan 23 03:03:27 localhost certmonger[39649]: dJWTU4WqPQLe7A== Jan 23 03:03:27 localhost certmonger[39649]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:27 localhost certmonger[39649]: " for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvcdm76UHAFxBFl698YkYA1xaSwszLOKynoagJ0rOLiTOaVnWGYVoWXEuAxPgdNj/1Ih1uvIsYCtlSoLktgnzCNBLok0NZus4oAWclvCsIgfYmftWkWanpkImt0JcE3XKFgmKHTHPoMn8wiDXVFFrDpC+xHcwqyGPK/4bZ04z0DGrMnjsZsoTDTl5GFkNEYggtHdlYVpNWzk4jlh9C3FKj/dzpK7ycRhk9ag4zRL1f8fJ42mvxWHz75NecsDjW/tJAUeYUk/KlVu5CFDxHYzsQEyUOT/xXEhHk5pxGtBTUDx3FWc5x7fEdXF7xmw1s1VT4KXecjtACpNxW3WzsvJqswIDAQAB" for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:27 localhost certmonger[39649]: 2026-01-23 08:03:27 [39649] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost certmonger[39649]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:27 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dc4a3983-21a8-4e70-bc2a-2e9a904b2237 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1072f5-bed8-41ac-8ee6-1fb2ba6f194b Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 31cdb141-db3a-4538-8582-4c9a58071304 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:27 localhost certmonger[39649]: Certificate: "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" Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Certificate submission still ongoing. Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Certificate submission attempt complete. Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Child status = 0. Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Child output: Jan 23 03:03:27 localhost certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:27 localhost certmonger[38898]: MIIFWTCCA8GgAwIBAgIRAKBGUzMiGYRbF2Ig4RzXBaEwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:27 localhost certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:27 localhost certmonger[38898]: cml0eTAeFw0yNjAxMjMwODAzMjdaFw0yODAxMjQwODAzMjdaMDwxETAPBgNVBAoM Jan 23 03:03:27 localhost certmonger[38898]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDIuZXh0ZXJuYWwub29vLnRl Jan 23 03:03:27 localhost certmonger[38898]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9x2bvpQcAXEEWXr3x Jan 23 03:03:27 localhost certmonger[38898]: iRgDXFpLCzMs4rKehqAnSs4uJM5pWdYZhWhZcS4DE+B02P/UiHW68ixgK2VKguS2 Jan 23 03:03:27 localhost certmonger[38898]: CfMI0EuiTQ1m6zigBZyW8KwiB9iZ+1aRZqemQia3QlwTdcoWCYodMc+gyfzCINdU Jan 23 03:03:27 localhost certmonger[38898]: UWsOkL7EdzCrIY8r/htnTjPQMasyeOxmyhMNOXkYWQ0RiCC0d2VhWk1bOTiOWH0L Jan 23 03:03:27 localhost certmonger[38898]: cUqP93OkrvJxGGT1qDjNEvV/x8njaa/FYfPvk15ywONb+0kBR5hST8qVW7kIUPEd Jan 23 03:03:27 localhost certmonger[38898]: jOxATJQ5P/FcSEeTmnEa0FNQPHcVZznHt8R1cXvGbDWzVVPgpd5yO0AKk3FbdbOy Jan 23 03:03:27 localhost certmonger[38898]: 8mqzAgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 03:03:27 localhost certmonger[38898]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:27 localhost certmonger[38898]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 03:03:27 localhost certmonger[38898]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:27 localhost certmonger[38898]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 03:03:27 localhost certmonger[38898]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR5l1tZ Jan 23 03:03:27 localhost certmonger[38898]: ko8Nthrllk82LiGLYDcczzCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDIuZXh0 Jan 23 03:03:27 localhost certmonger[38898]: ZXJuYWwub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw Jan 23 03:03:27 localhost certmonger[38898]: Mi5leHRlcm5hbC5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P Jan 23 03:03:27 localhost certmonger[38898]: Ty5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAyLmV4dGVybmFs Jan 23 03:03:27 localhost certmonger[38898]: Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQC8qXq3VvhsVmXmN3ZV0gUCZ9Ej Jan 23 03:03:27 localhost certmonger[38898]: g0oocWHNBZwrcQf5dbwjWEqkxgKrad3zGO1OmO0SjxbnePVQZtiQqN99s1ezrXqo Jan 23 03:03:27 localhost certmonger[38898]: 9DE+g3u9vHzPVRBigJRgfSzU0dH1U8MGRMhsQeU/FzNIyJF3XWzbwMjMrimoKUHn Jan 23 03:03:27 localhost certmonger[38898]: tn6HuZYbpjx+lnebi/2pICuGWRS7GmVwqC6S+5NT6TGUyjh8+/xpnfencKOnGCf3 Jan 23 03:03:27 localhost certmonger[38898]: TxskOMdWUWbBVdejLYOfPPi1YMpdehXNKOH08XlyDZWagctwCqJ7VVgcGlkdiHR7 Jan 23 03:03:27 localhost certmonger[38898]: wYUJOTxhk/xe0hIglo2lbP/AXFRoXwdXDNjQGlnOitcseMEBJr+1Sd9/7vb5tNTx Jan 23 03:03:27 localhost certmonger[38898]: SBJYnIKSO8nUeNZXxuOPsPBHjNNXnEGjdAMmPVkXP478/aCzFYdgKTU7smwcOrW/ Jan 23 03:03:27 localhost certmonger[38898]: SF8wLp4hY+4tPM5OFN+3rpWdpUGlYbz4yie3zNxeqtqeEAx+904Dp5dVXjOTnX9o Jan 23 03:03:27 localhost certmonger[38898]: 9dSshuyulh6CiJTkeeP9VuKNNLfsIyJ7/u1/MJU= Jan 23 03:03:27 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:27 localhost certmonger[38898]: " Jan 23 03:03:27 localhost certmonger[39651]: 2026-01-23 08:03:27 [39651] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:27 localhost certmonger[39651]: MIIFWTCCA8GgAwIBAgIRAKBGUzMiGYRbF2Ig4RzXBaEwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:27 localhost certmonger[39651]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:27 localhost certmonger[39651]: cml0eTAeFw0yNjAxMjMwODAzMjdaFw0yODAxMjQwODAzMjdaMDwxETAPBgNVBAoM Jan 23 03:03:27 localhost certmonger[39651]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDIuZXh0ZXJuYWwub29vLnRl Jan 23 03:03:27 localhost certmonger[39651]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9x2bvpQcAXEEWXr3x Jan 23 03:03:27 localhost certmonger[39651]: iRgDXFpLCzMs4rKehqAnSs4uJM5pWdYZhWhZcS4DE+B02P/UiHW68ixgK2VKguS2 Jan 23 03:03:27 localhost certmonger[39651]: CfMI0EuiTQ1m6zigBZyW8KwiB9iZ+1aRZqemQia3QlwTdcoWCYodMc+gyfzCINdU Jan 23 03:03:27 localhost certmonger[39651]: UWsOkL7EdzCrIY8r/htnTjPQMasyeOxmyhMNOXkYWQ0RiCC0d2VhWk1bOTiOWH0L Jan 23 03:03:27 localhost certmonger[39651]: cUqP93OkrvJxGGT1qDjNEvV/x8njaa/FYfPvk15ywONb+0kBR5hST8qVW7kIUPEd Jan 23 03:03:27 localhost certmonger[39651]: jOxATJQ5P/FcSEeTmnEa0FNQPHcVZznHt8R1cXvGbDWzVVPgpd5yO0AKk3FbdbOy Jan 23 03:03:27 localhost certmonger[39651]: 8mqzAgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 03:03:27 localhost certmonger[39651]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:27 localhost certmonger[39651]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 03:03:27 localhost certmonger[39651]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:27 localhost certmonger[39651]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 03:03:27 localhost certmonger[39651]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR5l1tZ Jan 23 03:03:27 localhost certmonger[39651]: ko8Nthrllk82LiGLYDcczzCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDIuZXh0 Jan 23 03:03:27 localhost certmonger[39651]: ZXJuYWwub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw Jan 23 03:03:27 localhost certmonger[39651]: Mi5leHRlcm5hbC5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P Jan 23 03:03:27 localhost certmonger[39651]: Ty5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAyLmV4dGVybmFs Jan 23 03:03:27 localhost certmonger[39651]: Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQC8qXq3VvhsVmXmN3ZV0gUCZ9Ej Jan 23 03:03:27 localhost certmonger[39651]: g0oocWHNBZwrcQf5dbwjWEqkxgKrad3zGO1OmO0SjxbnePVQZtiQqN99s1ezrXqo Jan 23 03:03:27 localhost certmonger[39651]: 9DE+g3u9vHzPVRBigJRgfSzU0dH1U8MGRMhsQeU/FzNIyJF3XWzbwMjMrimoKUHn Jan 23 03:03:27 localhost certmonger[39651]: tn6HuZYbpjx+lnebi/2pICuGWRS7GmVwqC6S+5NT6TGUyjh8+/xpnfencKOnGCf3 Jan 23 03:03:27 localhost certmonger[39651]: TxskOMdWUWbBVdejLYOfPPi1YMpdehXNKOH08XlyDZWagctwCqJ7VVgcGlkdiHR7 Jan 23 03:03:27 localhost certmonger[39651]: wYUJOTxhk/xe0hIglo2lbP/AXFRoXwdXDNjQGlnOitcseMEBJr+1Sd9/7vb5tNTx Jan 23 03:03:27 localhost certmonger[39651]: SBJYnIKSO8nUeNZXxuOPsPBHjNNXnEGjdAMmPVkXP478/aCzFYdgKTU7smwcOrW/ Jan 23 03:03:27 localhost certmonger[39651]: SF8wLp4hY+4tPM5OFN+3rpWdpUGlYbz4yie3zNxeqtqeEAx+904Dp5dVXjOTnX9o Jan 23 03:03:27 localhost certmonger[39651]: 9dSshuyulh6CiJTkeeP9VuKNNLfsIyJ7/u1/MJU= Jan 23 03:03:27 localhost certmonger[39651]: -----END CERTIFICATE----- Jan 23 03:03:27 localhost certmonger[39651]: ". Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Certificate submission still ongoing. Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Certificate submission postprocessing complete. Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Child status = 0. Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Child output: Jan 23 03:03:27 localhost certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n9dSshuyulh6CiJTkeeP9VuKNNLfsIyJ7/u1/MJU=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:27 localhost certmonger[38898]: " Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:27 localhost certmonger[38898]: MIIFWTCCA8GgAwIBAgIRAKBGUzMiGYRbF2Ig4RzXBaEwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:27 localhost certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:27 localhost certmonger[38898]: cml0eTAeFw0yNjAxMjMwODAzMjdaFw0yODAxMjQwODAzMjdaMDwxETAPBgNVBAoM Jan 23 03:03:27 localhost certmonger[38898]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDIuZXh0ZXJuYWwub29vLnRl Jan 23 03:03:27 localhost certmonger[38898]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9x2bvpQcAXEEWXr3x Jan 23 03:03:27 localhost certmonger[38898]: iRgDXFpLCzMs4rKehqAnSs4uJM5pWdYZhWhZcS4DE+B02P/UiHW68ixgK2VKguS2 Jan 23 03:03:27 localhost certmonger[38898]: CfMI0EuiTQ1m6zigBZyW8KwiB9iZ+1aRZqemQia3QlwTdcoWCYodMc+gyfzCINdU Jan 23 03:03:27 localhost certmonger[38898]: UWsOkL7EdzCrIY8r/htnTjPQMasyeOxmyhMNOXkYWQ0RiCC0d2VhWk1bOTiOWH0L Jan 23 03:03:27 localhost certmonger[38898]: cUqP93OkrvJxGGT1qDjNEvV/x8njaa/FYfPvk15ywONb+0kBR5hST8qVW7kIUPEd Jan 23 03:03:27 localhost certmonger[38898]: jOxATJQ5P/FcSEeTmnEa0FNQPHcVZznHt8R1cXvGbDWzVVPgpd5yO0AKk3FbdbOy Jan 23 03:03:27 localhost certmonger[38898]: 8mqzAgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 03:03:27 localhost certmonger[38898]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:27 localhost certmonger[38898]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 03:03:27 localhost certmonger[38898]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:27 localhost certmonger[38898]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 03:03:27 localhost certmonger[38898]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR5l1tZ Jan 23 03:03:27 localhost certmonger[38898]: ko8Nthrllk82LiGLYDcczzCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDIuZXh0 Jan 23 03:03:27 localhost certmonger[38898]: ZXJuYWwub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw Jan 23 03:03:27 localhost certmonger[38898]: Mi5leHRlcm5hbC5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P Jan 23 03:03:27 localhost certmonger[38898]: Ty5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAyLmV4dGVybmFs Jan 23 03:03:27 localhost certmonger[38898]: Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQC8qXq3VvhsVmXmN3ZV0gUCZ9Ej Jan 23 03:03:27 localhost certmonger[38898]: g0oocWHNBZwrcQf5dbwjWEqkxgKrad3zGO1OmO0SjxbnePVQZtiQqN99s1ezrXqo Jan 23 03:03:27 localhost certmonger[38898]: 9DE+g3u9vHzPVRBigJRgfSzU0dH1U8MGRMhsQeU/FzNIyJF3XWzbwMjMrimoKUHn Jan 23 03:03:27 localhost certmonger[38898]: tn6HuZYbpjx+lnebi/2pICuGWRS7GmVwqC6S+5NT6TGUyjh8+/xpnfencKOnGCf3 Jan 23 03:03:27 localhost certmonger[38898]: TxskOMdWUWbBVdejLYOfPPi1YMpdehXNKOH08XlyDZWagctwCqJ7VVgcGlkdiHR7 Jan 23 03:03:27 localhost certmonger[38898]: wYUJOTxhk/xe0hIglo2lbP/AXFRoXwdXDNjQGlnOitcseMEBJr+1Sd9/7vb5tNTx Jan 23 03:03:27 localhost certmonger[38898]: SBJYnIKSO8nUeNZXxuOPsPBHjNNXnEGjdAMmPVkXP478/aCzFYdgKTU7smwcOrW/ Jan 23 03:03:27 localhost certmonger[38898]: SF8wLp4hY+4tPM5OFN+3rpWdpUGlYbz4yie3zNxeqtqeEAx+904Dp5dVXjOTnX9o Jan 23 03:03:27 localhost certmonger[38898]: 9dSshuyulh6CiJTkeeP9VuKNNLfsIyJ7/u1/MJU= Jan 23 03:03:27 localhost certmonger[38898]: -----END CERTIFICATE----- Jan 23 03:03:27 localhost certmonger[38898]: ". Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] No hooks set for pre-save command. Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost certmonger[39659]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Jan 23 03:03:27 localhost certmonger[38898]: 2026-01-23 08:03:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:27 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost python3[39675]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:28 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:29 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:30 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 29dde550-4ef5-4162-87f6-9a1e9bec00c0 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3bc39772-4e38-4e44-b7d3-223f97f14085 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcbd5481-e2b0-439c-8cad-8a139937795d Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07aa6cf4-df94-4e83-a30a-1bfd767b1ab8 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87a7b787-4fd7-483f-9155-16163453f518 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 081f1d77-80a0-4904-aea4-3419cfcb3ebe Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61cbaa9-018c-42ad-bf2b-dcc6c3e2bc8d Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 88cfd95c-ec9c-4cc3-8ae7-756dcdf22912 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8ae349c5-0936-4278-8cd8-714d4ed8f9bb Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dc4a3983-21a8-4e70-bc2a-2e9a904b2237 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1072f5-bed8-41ac-8ee6-1fb2ba6f194b Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 31cdb141-db3a-4538-8582-4c9a58071304 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:31 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 29dde550-4ef5-4162-87f6-9a1e9bec00c0 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3bc39772-4e38-4e44-b7d3-223f97f14085 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcbd5481-e2b0-439c-8cad-8a139937795d Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 05a3a5ea-8125-4dc3-8e8c-7cdba6338bb1 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost kernel: VFS: idmapped mount is not enabled. Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:32 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07aa6cf4-df94-4e83-a30a-1bfd767b1ab8 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87a7b787-4fd7-483f-9155-16163453f518 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 081f1d77-80a0-4904-aea4-3419cfcb3ebe Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61cbaa9-018c-42ad-bf2b-dcc6c3e2bc8d Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 88cfd95c-ec9c-4cc3-8ae7-756dcdf22912 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8ae349c5-0936-4278-8cd8-714d4ed8f9bb Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dc4a3983-21a8-4e70-bc2a-2e9a904b2237 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1072f5-bed8-41ac-8ee6-1fb2ba6f194b Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 31cdb141-db3a-4538-8582-4c9a58071304 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 29dde550-4ef5-4162-87f6-9a1e9bec00c0 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3bc39772-4e38-4e44-b7d3-223f97f14085 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcbd5481-e2b0-439c-8cad-8a139937795d Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 05a3a5ea-8125-4dc3-8e8c-7cdba6338bb1 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:33 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07aa6cf4-df94-4e83-a30a-1bfd767b1ab8 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87a7b787-4fd7-483f-9155-16163453f518 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 081f1d77-80a0-4904-aea4-3419cfcb3ebe Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61cbaa9-018c-42ad-bf2b-dcc6c3e2bc8d Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 88cfd95c-ec9c-4cc3-8ae7-756dcdf22912 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8ae349c5-0936-4278-8cd8-714d4ed8f9bb Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dc4a3983-21a8-4e70-bc2a-2e9a904b2237 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1072f5-bed8-41ac-8ee6-1fb2ba6f194b Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 31cdb141-db3a-4538-8582-4c9a58071304 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 29dde550-4ef5-4162-87f6-9a1e9bec00c0 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 05a3a5ea-8125-4dc3-8e8c-7cdba6338bb1 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07aa6cf4-df94-4e83-a30a-1bfd767b1ab8 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87a7b787-4fd7-483f-9155-16163453f518 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08383f19-ba34-43e4-8829-d631d26c8232 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7d58f0af-319a-46b5-9823-ae6fbfc363a3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 081f1d77-80a0-4904-aea4-3419cfcb3ebe Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7302de41-0dba-4035-b4e2-c10f97bff3d3 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f61cbaa9-018c-42ad-bf2b-dcc6c3e2bc8d Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 88cfd95c-ec9c-4cc3-8ae7-756dcdf22912 Jan 23 03:03:34 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8ae349c5-0936-4278-8cd8-714d4ed8f9bb Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c21c9b21-46ae-49ce-bc0a-57c555d91558 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dc4a3983-21a8-4e70-bc2a-2e9a904b2237 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a7d86798-6c93-4ac4-bf0f-6700f0b93eff Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1072f5-bed8-41ac-8ee6-1fb2ba6f194b Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 31cdb141-db3a-4538-8582-4c9a58071304 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c94c7392-9ae7-4956-80ce-ae804ae4e588 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b7a6acfa-0262-4a80-ad7a-bc32fe6f15dc Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l daf48ce0-d245-4a6b-be97-f8881f27a32c Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 891905f6-c431-4a94-9de4-1b6b3cc83d67 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 29dde550-4ef5-4162-87f6-9a1e9bec00c0 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3bc39772-4e38-4e44-b7d3-223f97f14085 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcbd5481-e2b0-439c-8cad-8a139937795d Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 36b60aa1-204c-40cf-97b6-a0ce08368ef3 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 87fd8287-4e14-4565-8a08-cc4bb111fe87 Jan 23 03:03:35 localhost setroubleshoot[39504]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:43 localhost podman[39676]: 2026-01-23 08:03:28.604228095 +0000 UTC m=+0.044842373 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Jan 23 03:03:43 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:03:43 localhost python3[39797]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 cluster.common.tag/cinder-backup:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:43 localhost podman[39798]: 2026-01-23 08:03:43.821647594 +0000 UTC m=+0.042616044 image tag 01162f309a727f9f16ef893d348a6167be101f9c31f2a9a381f4a430ffc3b21a cluster.common.tag/cinder-backup:pcmklatest Jan 23 03:03:43 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:03:44 localhost python3[39824]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:45 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Jan 23 03:03:45 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.585s CPU time. Jan 23 03:03:45 localhost systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 23 03:03:45 localhost systemd[1]: setroubleshootd.service: Consumed 14.635s CPU time. Jan 23 03:03:48 localhost podman[39825]: 2026-01-23 08:03:44.35919183 +0000 UTC m=+0.042213981 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Jan 23 03:03:48 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:03:48 localhost python3[39891]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 cluster.common.tag/cinder-volume:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:48 localhost podman[39892]: 2026-01-23 08:03:48.835582073 +0000 UTC m=+0.035771984 image tag ccd22ddeb69c8f3a05d2d3f97d21f9fa64c6f2bc3a156f93212de7feacea314f cluster.common.tag/cinder-volume:pcmklatest Jan 23 03:03:48 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:03:49 localhost python3[39918]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:49 localhost python3[39935]: ansible-blockinfile Invoked with content=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 create=True path=/etc/rsyslog.d/openstack-haproxy.conf block=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:50 localhost python3[39951]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 08:03:50 np0005593102 systemd[1]: Stopping System Logging Service... Jan 23 08:03:50 np0005593102 rsyslogd[760]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="760" x-info="https://www.rsyslog.com"] exiting on signal 15. Jan 23 08:03:50 np0005593102 systemd[1]: rsyslog.service: Deactivated successfully. Jan 23 08:03:50 np0005593102 systemd[1]: Stopped System Logging Service. Jan 23 08:03:50 np0005593102 systemd[1]: rsyslog.service: Consumed 1.283s CPU time, read 920.0K from disk, written 2.4M to disk. Jan 23 08:03:50 np0005593102 systemd[1]: Starting System Logging Service... Jan 23 08:03:50 np0005593102 rsyslogd[39954]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="39954" x-info="https://www.rsyslog.com"] start Jan 23 08:03:50 np0005593102 systemd[1]: Started System Logging Service. Jan 23 08:03:50 np0005593102 rsyslogd[39954]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 08:03:51 np0005593102 python3[39973]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:03:55 np0005593102 podman[39974]: 2026-01-23 08:03:51.470281254 +0000 UTC m=+0.049103953 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Jan 23 08:03:55 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:03:56 np0005593102 python3[40040]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 cluster.common.tag/haproxy:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:03:56 np0005593102 podman[40041]: 2026-01-23 08:03:56.46181429 +0000 UTC m=+0.050321419 image tag bc0fbe6b9534c6b74951010de79a1ae57713cd63ed3f582d78ca1561a7041088 cluster.common.tag/haproxy:pcmklatest Jan 23 08:03:56 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:03:56 np0005593102 python3[40067]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:03:57 np0005593102 sshd[40069]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:04:00 np0005593102 python3[40086]: ansible-systemd Invoked with enabled=True masked=False name=certmonger.service state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None Jan 23 08:04:01 np0005593102 python3[40105]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 08:04:02 np0005593102 python3[40121]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 08:04:02 np0005593102 python3[40137]: ansible-ansible.legacy.command Invoked with _raw_params=set -e#012ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012chmod 0644 ${ca_pem}#012update-ca-trust extract#012test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:04:03 np0005593102 python3[40163]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:04:04 np0005593102 python3[40183]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:07 np0005593102 python3[40200]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:10 np0005593102 python3[40393]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:11 np0005593102 python3[40409]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:11 np0005593102 python3[40425]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:04:12 np0005593102 python3[40443]: ansible-certificate_request Invoked with name=haproxy-external-cert dns=['overcloud.ooo.test'] ip=[] principal=['haproxy/overcloud.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-external-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012cp "/etc/pki/tls/private/haproxy-external-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012#012ca_type=ipa#012if [ "$ca_type" = "self-sign" ]; then#012 # refresh the ca cert just in case the ca cert has been renewed#012 ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012 openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012 chmod 0644 ${ca_pem}#012 update-ca-trust extract#012 test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 openssl x509 -in ${ca_pem} -out /tmp/cm-local-ca.pem#012 ca_path="/tmp/cm-local-ca.pem"#012else#012 ca_path="/etc/ipa/ca.crt"#012fi#012#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012service_pem="/etc/pki/tls/private/overcloud_endpoint.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:12 np0005593102 certmonger[38898]: 2026-01-23 08:04:12 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:12 np0005593102 certmonger[38898]: 2026-01-23 08:04:12 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:12 np0005593102 certmonger[38898]: 2026-01-23 08:04:12 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:12 np0005593102 certmonger[38898]: 2026-01-23 08:04:12 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:12 np0005593102 certmonger[38898]: 2026-01-23 08:04:12 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:12 np0005593102 certmonger[38898]: 2026-01-23 08:04:12 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:12 np0005593102 certmonger[38898]: 2026-01-23 08:04:12 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:12 np0005593102 certmonger[38898]: 2026-01-23 08:04:12 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:12 np0005593102 certmonger[38898]: 2026-01-23 08:04:12 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_REQ_SUBJECT" to "CN=overcloud.ooo.test" for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_REQ_HOSTNAME" to "overcloud.ooo.test Jan 23 08:04:13 np0005593102 certmonger[40453]: " for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/overcloud.ooo.test@OOO.TEST Jan 23 08:04:13 np0005593102 certmonger[40453]: " for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:13 np0005593102 certmonger[40453]: MIIDmjCCAoICAQAwHTEbMBkGA1UEAxMSb3ZlcmNsb3VkLm9vby50ZXN0MIIBIjAN Jan 23 08:04:13 np0005593102 certmonger[40453]: BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0MVsG5iz3qZ5tQnkKcWBEW/ib9uc Jan 23 08:04:13 np0005593102 certmonger[40453]: eoeFzLD+8cMYkEmwKHVp+ngL+qID64EK0QZZPW7PUC4MeumCK1gc9z8RGo+b18em Jan 23 08:04:13 np0005593102 certmonger[40453]: CfObOCCU+xxYTEnIMSz55vxOctmrZaxdNHJSWdQo60UInXANfuKF6Qc2VA4Hy3v0 Jan 23 08:04:13 np0005593102 certmonger[40453]: dFMXGsMVhhdQW4oZNHLBrWew7LnDu3DXo6GZRbMy9RWKR4RQRgqmKoTIJpaiwCts Jan 23 08:04:13 np0005593102 certmonger[40453]: 3VVLowQxai3iTvA8HQdXMV25uuAN2363Yw6pZrWqWHw/1w+gGWludNn7LQjiYaB+ Jan 23 08:04:13 np0005593102 certmonger[40453]: NBZjI9GRt4xqwc2ixuUP4kynukoZG2taSLHKhxnB0irjaSVJHLE4VtoopQIDAQAB Jan 23 08:04:13 np0005593102 certmonger[40453]: oIIBNjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIAMwAwADgAMAA0ADEA Jan 23 08:04:13 np0005593102 certmonger[40453]: MjCCAQUGCSqGSIb3DQEJDjGB9zCB9DALBgNVHQ8EBAMCBaAwgZgGA1UdEQSBkDCB Jan 23 08:04:13 np0005593102 certmonger[40453]: jYISb3ZlcmNsb3VkLm9vby50ZXN0oDMGCisGAQQBgjcUAgOgJQwjaGFwcm94eS9v Jan 23 08:04:13 np0005593102 certmonger[40453]: dmVyY2xvdWQub29vLnRlc3RAT09PLlRFU1SgQgYGKwYBBQICoDgwNqAKGwhPT08u Jan 23 08:04:13 np0005593102 certmonger[40453]: VEVTVKEoMCagAwIBAaEfMB0bB2hhcHJveHkbEm92ZXJjbG91ZC5vb28udGVzdDAd Jan 23 08:04:13 np0005593102 certmonger[40453]: BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNV Jan 23 08:04:13 np0005593102 certmonger[40453]: HQ4EFgQUAVzufQRcf+fKw6BOJIVj/vqplj8wDQYJKoZIhvcNAQELBQADggEBAEr7 Jan 23 08:04:13 np0005593102 certmonger[40453]: X5qeaAeXDXU0EGjJBvvQxDRJGbiyODUQqnIG8VhXZNX9E/V8h4Okme1OtZVO7mzT Jan 23 08:04:13 np0005593102 certmonger[40453]: 6IZToQmJEcCTJ/gtTT4kAAKwVmw6Ep5iDCgvC5p6NdIN5pXN/gxV9jHsGpwVSU+Y Jan 23 08:04:13 np0005593102 certmonger[40453]: 1RTqjZ89PdbKL8jfLPmxG9XacpWSztPkHgB8ybU+VVXOUoIXqM9ukZBqAGUsB7cc Jan 23 08:04:13 np0005593102 certmonger[40453]: qyFt9mlt/lJPdJLitFjGhwydSTg3A94cL/2PDimQqxG+dsyOBt6SeiIhy+71/VzC Jan 23 08:04:13 np0005593102 certmonger[40453]: R/w0n7EaV3HbLkBPepctsGA9SvuKa/S+56YxqKYwPnPZVK2384XGdHp7A5pclcfy Jan 23 08:04:13 np0005593102 certmonger[40453]: I/AUCANkiP5fjTAFcpQ= Jan 23 08:04:13 np0005593102 certmonger[40453]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:13 np0005593102 certmonger[40453]: " for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0MVsG5iz3qZ5tQnkKcWBEW/ib9uceoeFzLD+8cMYkEmwKHVp+ngL+qID64EK0QZZPW7PUC4MeumCK1gc9z8RGo+b18emCfObOCCU+xxYTEnIMSz55vxOctmrZaxdNHJSWdQo60UInXANfuKF6Qc2VA4Hy3v0dFMXGsMVhhdQW4oZNHLBrWew7LnDu3DXo6GZRbMy9RWKR4RQRgqmKoTIJpaiwCts3VVLowQxai3iTvA8HQdXMV25uuAN2363Yw6pZrWqWHw/1w+gGWludNn7LQjiYaB+NBZjI9GRt4xqwc2ixuUP4kynukoZG2taSLHKhxnB0irjaSVJHLE4VtoopQIDAQAB" for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:13 np0005593102 certmonger[40453]: 2026-01-23 08:04:13 [40453] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[40453]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:13 np0005593102 certmonger[40453]: Certificate: "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" Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Certificate submission still ongoing. Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Certificate submission attempt complete. Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Child status = 0. Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Child output: Jan 23 08:04:13 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:13 np0005593102 certmonger[38898]: MIIFLzCCA5egAwIBAgIRALCWrMoNYNZbLqVxqOP7mm8wDQYJKoZIhvcNAQELBQAw Jan 23 08:04:13 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:13 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MTNaFw0yODAxMjQwODA0MTNaMDAxETAPBgNVBAoM Jan 23 08:04:13 np0005593102 certmonger[38898]: CE9PTy5URVNUMRswGQYDVQQDDBJvdmVyY2xvdWQub29vLnRlc3QwggEiMA0GCSqG Jan 23 08:04:13 np0005593102 certmonger[38898]: SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDQxWwbmLPepnm1CeQpxYERb+Jv25x6h4XM Jan 23 08:04:13 np0005593102 certmonger[38898]: sP7xwxiQSbAodWn6eAv6ogPrgQrRBlk9bs9QLgx66YIrWBz3PxEaj5vXx6YJ85s4 Jan 23 08:04:13 np0005593102 certmonger[38898]: IJT7HFhMScgxLPnm/E5y2atlrF00clJZ1CjrRQidcA1+4oXpBzZUDgfLe/R0Uxca Jan 23 08:04:13 np0005593102 certmonger[38898]: wxWGF1Bbihk0csGtZ7DsucO7cNejoZlFszL1FYpHhFBGCqYqhMgmlqLAK2zdVUuj Jan 23 08:04:13 np0005593102 certmonger[38898]: BDFqLeJO8DwdB1cxXbm64A3bfrdjDqlmtapYfD/XD6AZaW502fstCOJhoH40FmMj Jan 23 08:04:13 np0005593102 certmonger[38898]: 0ZG3jGrBzaLG5Q/iTKe6Shkba1pIscqHGcHSKuNpJUkcsThW2iilAgMBAAGjggG/ Jan 23 08:04:13 np0005593102 certmonger[38898]: MIIBuzAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcB Jan 23 08:04:13 np0005593102 certmonger[38898]: AQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2Nz Jan 23 08:04:13 np0005593102 certmonger[38898]: cDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC Jan 23 08:04:13 np0005593102 certmonger[38898]: MHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2Ny Jan 23 08:04:13 np0005593102 certmonger[38898]: bC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwV Jan 23 08:04:13 np0005593102 certmonger[38898]: Q2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTB20H31ejCYkI/VfBkg60S Jan 23 08:04:13 np0005593102 certmonger[38898]: lWQNxzCBmAYDVR0RBIGQMIGNghJvdmVyY2xvdWQub29vLnRlc3SgMwYKKwYBBAGC Jan 23 08:04:13 np0005593102 certmonger[38898]: NxQCA6AlDCNoYXByb3h5L292ZXJjbG91ZC5vb28udGVzdEBPT08uVEVTVKBCBgYr Jan 23 08:04:13 np0005593102 certmonger[38898]: BgEFAgKgODA2oAobCE9PTy5URVNUoSgwJqADAgEBoR8wHRsHaGFwcm94eRsSb3Zl Jan 23 08:04:13 np0005593102 certmonger[38898]: cmNsb3VkLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQALHfmW/HFYd9Pmrafo Jan 23 08:04:13 np0005593102 certmonger[38898]: SlsEYhzVyNByF5nkRLcgHK+phUI+ZJidPmeWhb+pI5wp4sskuXzb4gc3Qp9xWdA+ Jan 23 08:04:13 np0005593102 certmonger[38898]: RdgGHANiigxO52rSlgEy9zA4HmeHi1sUTYTX4gkD7w8ZPgkCChpp6OSIqKd0MAed Jan 23 08:04:13 np0005593102 certmonger[38898]: zPYl/kwvFajTKxJBiJwUTyYFbdCXjQoEe5iDMpLMvRp9MSyOZiEuILDuOa6/fjR5 Jan 23 08:04:13 np0005593102 certmonger[38898]: Mn3jFD/4SO28GkURHeOfu5KtjPdyxiJ9Z4t5q4auqqDmibPdWC9i8uz01WKJNHj2 Jan 23 08:04:13 np0005593102 certmonger[38898]: zGRqxeZbjuHORItA5xyWb6IqKA4b6mN5F89G92zCRpdnfxLxo0qD3JAbzJVAAS+v Jan 23 08:04:13 np0005593102 certmonger[38898]: GBjNtaqd+hB983QZGYTOI+Moj9cCEH5po7e5GrbBINFbH0PjMNPpQ2G/9Fntm7W7 Jan 23 08:04:13 np0005593102 certmonger[38898]: 6DzjFukwfICUNHxIA66BHqjg074uo1ZxxnNLZEpT3poSOe7aor9x5ywQWBGnkful Jan 23 08:04:13 np0005593102 certmonger[38898]: dghpCy26GLMnqCqmasfjxa7t+o7JH+PcBOuWrxcIhgCR4z4= Jan 23 08:04:13 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:13 np0005593102 certmonger[38898]: " Jan 23 08:04:13 np0005593102 certmonger[40455]: 2026-01-23 08:04:13 [40455] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:13 np0005593102 certmonger[40455]: MIIFLzCCA5egAwIBAgIRALCWrMoNYNZbLqVxqOP7mm8wDQYJKoZIhvcNAQELBQAw Jan 23 08:04:13 np0005593102 certmonger[40455]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:13 np0005593102 certmonger[40455]: cml0eTAeFw0yNjAxMjMwODA0MTNaFw0yODAxMjQwODA0MTNaMDAxETAPBgNVBAoM Jan 23 08:04:13 np0005593102 certmonger[40455]: CE9PTy5URVNUMRswGQYDVQQDDBJvdmVyY2xvdWQub29vLnRlc3QwggEiMA0GCSqG Jan 23 08:04:13 np0005593102 certmonger[40455]: SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDQxWwbmLPepnm1CeQpxYERb+Jv25x6h4XM Jan 23 08:04:13 np0005593102 certmonger[40455]: sP7xwxiQSbAodWn6eAv6ogPrgQrRBlk9bs9QLgx66YIrWBz3PxEaj5vXx6YJ85s4 Jan 23 08:04:13 np0005593102 certmonger[40455]: IJT7HFhMScgxLPnm/E5y2atlrF00clJZ1CjrRQidcA1+4oXpBzZUDgfLe/R0Uxca Jan 23 08:04:13 np0005593102 certmonger[40455]: wxWGF1Bbihk0csGtZ7DsucO7cNejoZlFszL1FYpHhFBGCqYqhMgmlqLAK2zdVUuj Jan 23 08:04:13 np0005593102 certmonger[40455]: BDFqLeJO8DwdB1cxXbm64A3bfrdjDqlmtapYfD/XD6AZaW502fstCOJhoH40FmMj Jan 23 08:04:13 np0005593102 certmonger[40455]: 0ZG3jGrBzaLG5Q/iTKe6Shkba1pIscqHGcHSKuNpJUkcsThW2iilAgMBAAGjggG/ Jan 23 08:04:13 np0005593102 certmonger[40455]: MIIBuzAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcB Jan 23 08:04:13 np0005593102 certmonger[40455]: AQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2Nz Jan 23 08:04:13 np0005593102 certmonger[40455]: cDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC Jan 23 08:04:13 np0005593102 certmonger[40455]: MHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2Ny Jan 23 08:04:13 np0005593102 certmonger[40455]: bC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwV Jan 23 08:04:13 np0005593102 certmonger[40455]: Q2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTB20H31ejCYkI/VfBkg60S Jan 23 08:04:13 np0005593102 certmonger[40455]: lWQNxzCBmAYDVR0RBIGQMIGNghJvdmVyY2xvdWQub29vLnRlc3SgMwYKKwYBBAGC Jan 23 08:04:13 np0005593102 certmonger[40455]: NxQCA6AlDCNoYXByb3h5L292ZXJjbG91ZC5vb28udGVzdEBPT08uVEVTVKBCBgYr Jan 23 08:04:13 np0005593102 certmonger[40455]: BgEFAgKgODA2oAobCE9PTy5URVNUoSgwJqADAgEBoR8wHRsHaGFwcm94eRsSb3Zl Jan 23 08:04:13 np0005593102 certmonger[40455]: cmNsb3VkLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQALHfmW/HFYd9Pmrafo Jan 23 08:04:13 np0005593102 certmonger[40455]: SlsEYhzVyNByF5nkRLcgHK+phUI+ZJidPmeWhb+pI5wp4sskuXzb4gc3Qp9xWdA+ Jan 23 08:04:13 np0005593102 certmonger[40455]: RdgGHANiigxO52rSlgEy9zA4HmeHi1sUTYTX4gkD7w8ZPgkCChpp6OSIqKd0MAed Jan 23 08:04:13 np0005593102 certmonger[40455]: zPYl/kwvFajTKxJBiJwUTyYFbdCXjQoEe5iDMpLMvRp9MSyOZiEuILDuOa6/fjR5 Jan 23 08:04:13 np0005593102 certmonger[40455]: Mn3jFD/4SO28GkURHeOfu5KtjPdyxiJ9Z4t5q4auqqDmibPdWC9i8uz01WKJNHj2 Jan 23 08:04:13 np0005593102 certmonger[40455]: zGRqxeZbjuHORItA5xyWb6IqKA4b6mN5F89G92zCRpdnfxLxo0qD3JAbzJVAAS+v Jan 23 08:04:13 np0005593102 certmonger[40455]: GBjNtaqd+hB983QZGYTOI+Moj9cCEH5po7e5GrbBINFbH0PjMNPpQ2G/9Fntm7W7 Jan 23 08:04:13 np0005593102 certmonger[40455]: 6DzjFukwfICUNHxIA66BHqjg074uo1ZxxnNLZEpT3poSOe7aor9x5ywQWBGnkful Jan 23 08:04:13 np0005593102 certmonger[40455]: dghpCy26GLMnqCqmasfjxa7t+o7JH+PcBOuWrxcIhgCR4z4= Jan 23 08:04:13 np0005593102 certmonger[40455]: -----END CERTIFICATE----- Jan 23 08:04:13 np0005593102 certmonger[40455]: ". Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Certificate submission still ongoing. Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Certificate submission postprocessing complete. Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Child status = 0. Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Child output: Jan 23 08:04:13 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ndghpCy26GLMnqCqmasfjxa7t+o7JH+PcBOuWrxcIhgCR4z4=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:13 np0005593102 certmonger[38898]: " Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:13 np0005593102 certmonger[38898]: MIIFLzCCA5egAwIBAgIRALCWrMoNYNZbLqVxqOP7mm8wDQYJKoZIhvcNAQELBQAw Jan 23 08:04:13 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:13 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MTNaFw0yODAxMjQwODA0MTNaMDAxETAPBgNVBAoM Jan 23 08:04:13 np0005593102 certmonger[38898]: CE9PTy5URVNUMRswGQYDVQQDDBJvdmVyY2xvdWQub29vLnRlc3QwggEiMA0GCSqG Jan 23 08:04:13 np0005593102 certmonger[38898]: SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDQxWwbmLPepnm1CeQpxYERb+Jv25x6h4XM Jan 23 08:04:13 np0005593102 certmonger[38898]: sP7xwxiQSbAodWn6eAv6ogPrgQrRBlk9bs9QLgx66YIrWBz3PxEaj5vXx6YJ85s4 Jan 23 08:04:13 np0005593102 certmonger[38898]: IJT7HFhMScgxLPnm/E5y2atlrF00clJZ1CjrRQidcA1+4oXpBzZUDgfLe/R0Uxca Jan 23 08:04:13 np0005593102 certmonger[38898]: wxWGF1Bbihk0csGtZ7DsucO7cNejoZlFszL1FYpHhFBGCqYqhMgmlqLAK2zdVUuj Jan 23 08:04:13 np0005593102 certmonger[38898]: BDFqLeJO8DwdB1cxXbm64A3bfrdjDqlmtapYfD/XD6AZaW502fstCOJhoH40FmMj Jan 23 08:04:13 np0005593102 certmonger[38898]: 0ZG3jGrBzaLG5Q/iTKe6Shkba1pIscqHGcHSKuNpJUkcsThW2iilAgMBAAGjggG/ Jan 23 08:04:13 np0005593102 certmonger[38898]: MIIBuzAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcB Jan 23 08:04:13 np0005593102 certmonger[38898]: AQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2Nz Jan 23 08:04:13 np0005593102 certmonger[38898]: cDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC Jan 23 08:04:13 np0005593102 certmonger[38898]: MHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2Ny Jan 23 08:04:13 np0005593102 certmonger[38898]: bC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwV Jan 23 08:04:13 np0005593102 certmonger[38898]: Q2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTB20H31ejCYkI/VfBkg60S Jan 23 08:04:13 np0005593102 certmonger[38898]: lWQNxzCBmAYDVR0RBIGQMIGNghJvdmVyY2xvdWQub29vLnRlc3SgMwYKKwYBBAGC Jan 23 08:04:13 np0005593102 certmonger[38898]: NxQCA6AlDCNoYXByb3h5L292ZXJjbG91ZC5vb28udGVzdEBPT08uVEVTVKBCBgYr Jan 23 08:04:13 np0005593102 certmonger[38898]: BgEFAgKgODA2oAobCE9PTy5URVNUoSgwJqADAgEBoR8wHRsHaGFwcm94eRsSb3Zl Jan 23 08:04:13 np0005593102 certmonger[38898]: cmNsb3VkLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQALHfmW/HFYd9Pmrafo Jan 23 08:04:13 np0005593102 certmonger[38898]: SlsEYhzVyNByF5nkRLcgHK+phUI+ZJidPmeWhb+pI5wp4sskuXzb4gc3Qp9xWdA+ Jan 23 08:04:13 np0005593102 certmonger[38898]: RdgGHANiigxO52rSlgEy9zA4HmeHi1sUTYTX4gkD7w8ZPgkCChpp6OSIqKd0MAed Jan 23 08:04:13 np0005593102 certmonger[38898]: zPYl/kwvFajTKxJBiJwUTyYFbdCXjQoEe5iDMpLMvRp9MSyOZiEuILDuOa6/fjR5 Jan 23 08:04:13 np0005593102 certmonger[38898]: Mn3jFD/4SO28GkURHeOfu5KtjPdyxiJ9Z4t5q4auqqDmibPdWC9i8uz01WKJNHj2 Jan 23 08:04:13 np0005593102 certmonger[38898]: zGRqxeZbjuHORItA5xyWb6IqKA4b6mN5F89G92zCRpdnfxLxo0qD3JAbzJVAAS+v Jan 23 08:04:13 np0005593102 certmonger[38898]: GBjNtaqd+hB983QZGYTOI+Moj9cCEH5po7e5GrbBINFbH0PjMNPpQ2G/9Fntm7W7 Jan 23 08:04:13 np0005593102 certmonger[38898]: 6DzjFukwfICUNHxIA66BHqjg074uo1ZxxnNLZEpT3poSOe7aor9x5ywQWBGnkful Jan 23 08:04:13 np0005593102 certmonger[38898]: dghpCy26GLMnqCqmasfjxa7t+o7JH+PcBOuWrxcIhgCR4z4= Jan 23 08:04:13 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:13 np0005593102 certmonger[38898]: ". Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] No hooks set for pre-save command. Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 certmonger[38898]: 2026-01-23 08:04:13 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:13 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:13 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:14 np0005593102 certmonger[38898]: 2026-01-23 08:04:14 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:14 np0005593102 certmonger[38898]: 2026-01-23 08:04:14 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:14 np0005593102 certmonger[40560]: Certificate in file "/etc/pki/tls/certs/haproxy-external-cert.crt" issued by CA and saved. Jan 23 08:04:14 np0005593102 certmonger[38898]: 2026-01-23 08:04:14 [38898] Wrote to /var/lib/certmonger/requests/20260123080412 Jan 23 08:04:14 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:16 np0005593102 python3[40576]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 08:04:16 np0005593102 python3[40592]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 08:04:17 np0005593102 python3[40608]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:04:18 np0005593102 python3[40628]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:21 np0005593102 python3[40645]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:24 np0005593102 python3[40662]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:25 np0005593102 sshd[40679]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:04:25 np0005593102 python3[40678]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:25 np0005593102 python3[40696]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:04:26 np0005593102 python3[40714]: ansible-certificate_request Invoked with name=haproxy-ctlplane-cert dns=['np0005593102.ctlplane.ooo.test', 'overcloud.ctlplane.ooo.test'] principal=['haproxy/np0005593102.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012cp "/etc/pki/tls/private/haproxy-ctlplane-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.ctlplane.ooo.test" for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.ctlplane.ooo.test Jan 23 08:04:26 np0005593102 certmonger[40724]: overcloud.ctlplane.ooo.test Jan 23 08:04:26 np0005593102 certmonger[40724]: " for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005593102.ctlplane.ooo.test@OOO.TEST Jan 23 08:04:26 np0005593102 certmonger[40724]: " for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:26 np0005593102 certmonger[40724]: MIID6TCCAtECAQAwKTEnMCUGA1UEAxMebnAwMDA1NTkzMTAyLmN0bHBsYW5lLm9v Jan 23 08:04:26 np0005593102 certmonger[40724]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmzJRzkahz30v Jan 23 08:04:26 np0005593102 certmonger[40724]: fBSP3PQIPXT28MbvPRapbC85+jMtucbhglKnl2xPkYUfhZFBNLBFRr0beNOaIoAJ Jan 23 08:04:26 np0005593102 certmonger[40724]: pRU2iVOCr9A+tS7X92f+7yvFtRnWmD8khl2rwO9lQ/5DoTuRfiUY60HCFIeF/DQq Jan 23 08:04:26 np0005593102 certmonger[40724]: cETDhrKiVn9jXSu5qQg3NSbZqb5TrBrNmwgnJwpoWfZrq4EBiNcOqlf8Hcov8clJ Jan 23 08:04:26 np0005593102 certmonger[40724]: isdiLAyZa/1uCAabsLEm9n/4BjziO7nqX6KUuaCil0l2EFdSMRpsPq4nSS5lsqSo Jan 23 08:04:26 np0005593102 certmonger[40724]: nezEpHTrv+BVvHSQqAK96BrjI2Rzce5aJkQKLabRStH5LWWbP7y4sbl0LDcu7myL Jan 23 08:04:26 np0005593102 certmonger[40724]: iEa2JMvpHQIDAQABoIIBeTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIA Jan 23 08:04:26 np0005593102 certmonger[40724]: MwAwADgAMAA0ADIANjCCAUgGCSqGSIb3DQEJDjGCATkwggE1MAsGA1UdDwQEAwIF Jan 23 08:04:26 np0005593102 certmonger[40724]: oDCB2QYDVR0RBIHRMIHOgh5ucDAwMDU1OTMxMDIuY3RscGxhbmUub29vLnRlc3SC Jan 23 08:04:26 np0005593102 certmonger[40724]: G292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML2hh Jan 23 08:04:26 np0005593102 certmonger[40724]: cHJveHkvbnAwMDA1NTkzMTAyLmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoE4G Jan 23 08:04:26 np0005593102 certmonger[40724]: BisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwdoYXByb3h5Gx5u Jan 23 08:04:26 np0005593102 certmonger[40724]: cDAwMDU1OTMxMDIuY3RscGxhbmUub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 08:04:26 np0005593102 certmonger[40724]: AwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFPTHAZVaTkV6nUeD Jan 23 08:04:26 np0005593102 certmonger[40724]: LjWzZAQqpphNMA0GCSqGSIb3DQEBCwUAA4IBAQAG01/I1mCo1W1FvkToLMbuxLYk Jan 23 08:04:26 np0005593102 certmonger[40724]: nlLYBa6GthiIz5uDCO2oD4BvKUltDdEJKljY1Q0ElNSP9tC42hzbyhr9B7pRKplq Jan 23 08:04:26 np0005593102 certmonger[40724]: +wSiJIdChZZcDmFMfg6O81c/BIWKlc2sm5yfIAELNx+mDWfyuLujiq269Tb2iY8c Jan 23 08:04:26 np0005593102 certmonger[40724]: TOGdjouGk69y+ZUla9tQBDYEo0rs2ZmWcGiHWAG0on+RX2hX10oS7P1EpkQ1oXrk Jan 23 08:04:26 np0005593102 certmonger[40724]: WCJ4ju8dgTsYXBCnowkXhMNxs8Zo4yHNAIp7xxkfANEZnDoiFk2ahEY8HlyxrBrU Jan 23 08:04:26 np0005593102 certmonger[40724]: ZPJfxLBRIsD0Kg5xRrqYxUVL4LNkfM/9fAX/yvqZMPJAKsTS/GAcaPwYCSep Jan 23 08:04:26 np0005593102 certmonger[40724]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:26 np0005593102 certmonger[40724]: " for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmzJRzkahz30vfBSP3PQIPXT28MbvPRapbC85+jMtucbhglKnl2xPkYUfhZFBNLBFRr0beNOaIoAJpRU2iVOCr9A+tS7X92f+7yvFtRnWmD8khl2rwO9lQ/5DoTuRfiUY60HCFIeF/DQqcETDhrKiVn9jXSu5qQg3NSbZqb5TrBrNmwgnJwpoWfZrq4EBiNcOqlf8Hcov8clJisdiLAyZa/1uCAabsLEm9n/4BjziO7nqX6KUuaCil0l2EFdSMRpsPq4nSS5lsqSonezEpHTrv+BVvHSQqAK96BrjI2Rzce5aJkQKLabRStH5LWWbP7y4sbl0LDcu7myLiEa2JMvpHQIDAQAB" for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:26 np0005593102 certmonger[40724]: 2026-01-23 08:04:26 [40724] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:26 np0005593102 certmonger[38898]: 2026-01-23 08:04:26 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593102 certmonger[40724]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:27 np0005593102 certmonger[40724]: Certificate: "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" Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Certificate submission still ongoing. Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Certificate submission attempt complete. Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Child status = 0. Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Child output: Jan 23 08:04:27 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:27 np0005593102 certmonger[38898]: MIIFfDCCA+SgAwIBAgIRAOhYxKuge8zEZ8QcQoZI4/EwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:27 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:27 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MjdaFw0yODAxMjQwODA0MjdaMDwxETAPBgNVBAoM Jan 23 08:04:27 np0005593102 certmonger[38898]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDIuY3RscGxhbmUub29vLnRl Jan 23 08:04:27 np0005593102 certmonger[38898]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCbMlHORqHPfS98FI/c Jan 23 08:04:27 np0005593102 certmonger[38898]: 9Ag9dPbwxu89FqlsLzn6My25xuGCUqeXbE+RhR+FkUE0sEVGvRt405oigAmlFTaJ Jan 23 08:04:27 np0005593102 certmonger[38898]: U4Kv0D61Ltf3Z/7vK8W1GdaYPySGXavA72VD/kOhO5F+JRjrQcIUh4X8NCpwRMOG Jan 23 08:04:27 np0005593102 certmonger[38898]: sqJWf2NdK7mpCDc1JtmpvlOsGs2bCCcnCmhZ9murgQGI1w6qV/wdyi/xyUmKx2Is Jan 23 08:04:27 np0005593102 certmonger[38898]: DJlr/W4IBpuwsSb2f/gGPOI7uepfopS5oKKXSXYQV1IxGmw+ridJLmWypKid7MSk Jan 23 08:04:27 np0005593102 certmonger[38898]: dOu/4FW8dJCoAr3oGuMjZHNx7lomRAotptFK0fktZZs/vLixuXQsNy7ubIuIRrYk Jan 23 08:04:27 np0005593102 certmonger[38898]: y+kdAgMBAAGjggIAMIIB/DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 08:04:27 np0005593102 certmonger[38898]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 08:04:27 np0005593102 certmonger[38898]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 08:04:27 np0005593102 certmonger[38898]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 08:04:27 np0005593102 certmonger[38898]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 08:04:27 np0005593102 certmonger[38898]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSPEds5 Jan 23 08:04:27 np0005593102 certmonger[38898]: /uyZFTBPaVAdzYmL3R/RrjCB2QYDVR0RBIHRMIHOgh5ucDAwMDU1OTMxMDIuY3Rs Jan 23 08:04:27 np0005593102 certmonger[38898]: cGxhbmUub29vLnRlc3SCG292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/Bgor Jan 23 08:04:27 np0005593102 certmonger[38898]: BgEEAYI3FAIDoDEML2hhcHJveHkvbnAwMDA1NTkzMTAyLmN0bHBsYW5lLm9vby50 Jan 23 08:04:27 np0005593102 certmonger[38898]: ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGh Jan 23 08:04:27 np0005593102 certmonger[38898]: KzApGwdoYXByb3h5Gx5ucDAwMDU1OTMxMDIuY3RscGxhbmUub29vLnRlc3QwDQYJ Jan 23 08:04:27 np0005593102 certmonger[38898]: KoZIhvcNAQELBQADggGBAMEbMnSCMHciGinqeG0aVoub6LYHbUXnqC/UtdZ2abrs Jan 23 08:04:27 np0005593102 certmonger[38898]: E52iL3ceUrXjtDGRBQK2qDGYM5b9cAu5RWclss7Lv3U5nAeqy1oQK5M8BKeAj0AT Jan 23 08:04:27 np0005593102 certmonger[38898]: 6RxArOy/J+FkY9CtlBH2f+DYj9iEoYBwtaNfkIMLgDxg9+oSDxIadFOrnek7rGeq Jan 23 08:04:27 np0005593102 certmonger[38898]: vBMRDYo5pOrLVmZpKGNZzrLWQkd+5CWd3ms0bJm+sNoqvUIdRFSERqeQz/YzXW8Y Jan 23 08:04:27 np0005593102 certmonger[38898]: 0BIfq4eaAIPcLrp1w0it05xcpA3KUULj9Q9LJc/aFpOR359HE7NLfYPYXLUKR5p5 Jan 23 08:04:27 np0005593102 certmonger[38898]: E0g7tobF5YcKx7HyhWPosnUeMI18wF0Ynh90A64Z0Gy5YMSBL4yYpVX6A6JnrspN Jan 23 08:04:27 np0005593102 certmonger[38898]: 6laYyvYNwTPPpKHwjwu2RPdmAtSLgfKNCsOrHLkuAPPbvhAS1W991sNOq//FV1vo Jan 23 08:04:27 np0005593102 certmonger[38898]: dUcH+ZV3YnFJ4+1QePBlzSiwswnELIxh7rwXsjkHDHlEiFu8+C0PGITWlvsI2SnQ Jan 23 08:04:27 np0005593102 certmonger[38898]: SVu4WxotFpStbg2vabGY6g== Jan 23 08:04:27 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:27 np0005593102 certmonger[38898]: " Jan 23 08:04:27 np0005593102 certmonger[40726]: 2026-01-23 08:04:27 [40726] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:27 np0005593102 certmonger[40726]: MIIFfDCCA+SgAwIBAgIRAOhYxKuge8zEZ8QcQoZI4/EwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:27 np0005593102 certmonger[40726]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:27 np0005593102 certmonger[40726]: cml0eTAeFw0yNjAxMjMwODA0MjdaFw0yODAxMjQwODA0MjdaMDwxETAPBgNVBAoM Jan 23 08:04:27 np0005593102 certmonger[40726]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDIuY3RscGxhbmUub29vLnRl Jan 23 08:04:27 np0005593102 certmonger[40726]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCbMlHORqHPfS98FI/c Jan 23 08:04:27 np0005593102 certmonger[40726]: 9Ag9dPbwxu89FqlsLzn6My25xuGCUqeXbE+RhR+FkUE0sEVGvRt405oigAmlFTaJ Jan 23 08:04:27 np0005593102 certmonger[40726]: U4Kv0D61Ltf3Z/7vK8W1GdaYPySGXavA72VD/kOhO5F+JRjrQcIUh4X8NCpwRMOG Jan 23 08:04:27 np0005593102 certmonger[40726]: sqJWf2NdK7mpCDc1JtmpvlOsGs2bCCcnCmhZ9murgQGI1w6qV/wdyi/xyUmKx2Is Jan 23 08:04:27 np0005593102 certmonger[40726]: DJlr/W4IBpuwsSb2f/gGPOI7uepfopS5oKKXSXYQV1IxGmw+ridJLmWypKid7MSk Jan 23 08:04:27 np0005593102 certmonger[40726]: dOu/4FW8dJCoAr3oGuMjZHNx7lomRAotptFK0fktZZs/vLixuXQsNy7ubIuIRrYk Jan 23 08:04:27 np0005593102 certmonger[40726]: y+kdAgMBAAGjggIAMIIB/DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 08:04:27 np0005593102 certmonger[40726]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 08:04:27 np0005593102 certmonger[40726]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 08:04:27 np0005593102 certmonger[40726]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 08:04:27 np0005593102 certmonger[40726]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 08:04:27 np0005593102 certmonger[40726]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSPEds5 Jan 23 08:04:27 np0005593102 certmonger[40726]: /uyZFTBPaVAdzYmL3R/RrjCB2QYDVR0RBIHRMIHOgh5ucDAwMDU1OTMxMDIuY3Rs Jan 23 08:04:27 np0005593102 certmonger[40726]: cGxhbmUub29vLnRlc3SCG292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/Bgor Jan 23 08:04:27 np0005593102 certmonger[40726]: BgEEAYI3FAIDoDEML2hhcHJveHkvbnAwMDA1NTkzMTAyLmN0bHBsYW5lLm9vby50 Jan 23 08:04:27 np0005593102 certmonger[40726]: ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGh Jan 23 08:04:27 np0005593102 certmonger[40726]: KzApGwdoYXByb3h5Gx5ucDAwMDU1OTMxMDIuY3RscGxhbmUub29vLnRlc3QwDQYJ Jan 23 08:04:27 np0005593102 certmonger[40726]: KoZIhvcNAQELBQADggGBAMEbMnSCMHciGinqeG0aVoub6LYHbUXnqC/UtdZ2abrs Jan 23 08:04:27 np0005593102 certmonger[40726]: E52iL3ceUrXjtDGRBQK2qDGYM5b9cAu5RWclss7Lv3U5nAeqy1oQK5M8BKeAj0AT Jan 23 08:04:27 np0005593102 certmonger[40726]: 6RxArOy/J+FkY9CtlBH2f+DYj9iEoYBwtaNfkIMLgDxg9+oSDxIadFOrnek7rGeq Jan 23 08:04:27 np0005593102 certmonger[40726]: vBMRDYo5pOrLVmZpKGNZzrLWQkd+5CWd3ms0bJm+sNoqvUIdRFSERqeQz/YzXW8Y Jan 23 08:04:27 np0005593102 certmonger[40726]: 0BIfq4eaAIPcLrp1w0it05xcpA3KUULj9Q9LJc/aFpOR359HE7NLfYPYXLUKR5p5 Jan 23 08:04:27 np0005593102 certmonger[40726]: E0g7tobF5YcKx7HyhWPosnUeMI18wF0Ynh90A64Z0Gy5YMSBL4yYpVX6A6JnrspN Jan 23 08:04:27 np0005593102 certmonger[40726]: 6laYyvYNwTPPpKHwjwu2RPdmAtSLgfKNCsOrHLkuAPPbvhAS1W991sNOq//FV1vo Jan 23 08:04:27 np0005593102 certmonger[40726]: dUcH+ZV3YnFJ4+1QePBlzSiwswnELIxh7rwXsjkHDHlEiFu8+C0PGITWlvsI2SnQ Jan 23 08:04:27 np0005593102 certmonger[40726]: SVu4WxotFpStbg2vabGY6g== Jan 23 08:04:27 np0005593102 certmonger[40726]: -----END CERTIFICATE----- Jan 23 08:04:27 np0005593102 certmonger[40726]: ". Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Certificate submission still ongoing. Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Certificate submission postprocessing complete. Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Child status = 0. Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Child output: Jan 23 08:04:27 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nSVu4WxotFpStbg2vabGY6g==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:27 np0005593102 certmonger[38898]: " Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:27 np0005593102 certmonger[38898]: MIIFfDCCA+SgAwIBAgIRAOhYxKuge8zEZ8QcQoZI4/EwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:27 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:27 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MjdaFw0yODAxMjQwODA0MjdaMDwxETAPBgNVBAoM Jan 23 08:04:27 np0005593102 certmonger[38898]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDIuY3RscGxhbmUub29vLnRl Jan 23 08:04:27 np0005593102 certmonger[38898]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCbMlHORqHPfS98FI/c Jan 23 08:04:27 np0005593102 certmonger[38898]: 9Ag9dPbwxu89FqlsLzn6My25xuGCUqeXbE+RhR+FkUE0sEVGvRt405oigAmlFTaJ Jan 23 08:04:27 np0005593102 certmonger[38898]: U4Kv0D61Ltf3Z/7vK8W1GdaYPySGXavA72VD/kOhO5F+JRjrQcIUh4X8NCpwRMOG Jan 23 08:04:27 np0005593102 certmonger[38898]: sqJWf2NdK7mpCDc1JtmpvlOsGs2bCCcnCmhZ9murgQGI1w6qV/wdyi/xyUmKx2Is Jan 23 08:04:27 np0005593102 certmonger[38898]: DJlr/W4IBpuwsSb2f/gGPOI7uepfopS5oKKXSXYQV1IxGmw+ridJLmWypKid7MSk Jan 23 08:04:27 np0005593102 certmonger[38898]: dOu/4FW8dJCoAr3oGuMjZHNx7lomRAotptFK0fktZZs/vLixuXQsNy7ubIuIRrYk Jan 23 08:04:27 np0005593102 certmonger[38898]: y+kdAgMBAAGjggIAMIIB/DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 08:04:27 np0005593102 certmonger[38898]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 08:04:27 np0005593102 certmonger[38898]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 08:04:27 np0005593102 certmonger[38898]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 08:04:27 np0005593102 certmonger[38898]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 08:04:27 np0005593102 certmonger[38898]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSPEds5 Jan 23 08:04:27 np0005593102 certmonger[38898]: /uyZFTBPaVAdzYmL3R/RrjCB2QYDVR0RBIHRMIHOgh5ucDAwMDU1OTMxMDIuY3Rs Jan 23 08:04:27 np0005593102 certmonger[38898]: cGxhbmUub29vLnRlc3SCG292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/Bgor Jan 23 08:04:27 np0005593102 certmonger[38898]: BgEEAYI3FAIDoDEML2hhcHJveHkvbnAwMDA1NTkzMTAyLmN0bHBsYW5lLm9vby50 Jan 23 08:04:27 np0005593102 certmonger[38898]: ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGh Jan 23 08:04:27 np0005593102 certmonger[38898]: KzApGwdoYXByb3h5Gx5ucDAwMDU1OTMxMDIuY3RscGxhbmUub29vLnRlc3QwDQYJ Jan 23 08:04:27 np0005593102 certmonger[38898]: KoZIhvcNAQELBQADggGBAMEbMnSCMHciGinqeG0aVoub6LYHbUXnqC/UtdZ2abrs Jan 23 08:04:27 np0005593102 certmonger[38898]: E52iL3ceUrXjtDGRBQK2qDGYM5b9cAu5RWclss7Lv3U5nAeqy1oQK5M8BKeAj0AT Jan 23 08:04:27 np0005593102 certmonger[38898]: 6RxArOy/J+FkY9CtlBH2f+DYj9iEoYBwtaNfkIMLgDxg9+oSDxIadFOrnek7rGeq Jan 23 08:04:27 np0005593102 certmonger[38898]: vBMRDYo5pOrLVmZpKGNZzrLWQkd+5CWd3ms0bJm+sNoqvUIdRFSERqeQz/YzXW8Y Jan 23 08:04:27 np0005593102 certmonger[38898]: 0BIfq4eaAIPcLrp1w0it05xcpA3KUULj9Q9LJc/aFpOR359HE7NLfYPYXLUKR5p5 Jan 23 08:04:27 np0005593102 certmonger[38898]: E0g7tobF5YcKx7HyhWPosnUeMI18wF0Ynh90A64Z0Gy5YMSBL4yYpVX6A6JnrspN Jan 23 08:04:27 np0005593102 certmonger[38898]: 6laYyvYNwTPPpKHwjwu2RPdmAtSLgfKNCsOrHLkuAPPbvhAS1W991sNOq//FV1vo Jan 23 08:04:27 np0005593102 certmonger[38898]: dUcH+ZV3YnFJ4+1QePBlzSiwswnELIxh7rwXsjkHDHlEiFu8+C0PGITWlvsI2SnQ Jan 23 08:04:27 np0005593102 certmonger[38898]: SVu4WxotFpStbg2vabGY6g== Jan 23 08:04:27 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:27 np0005593102 certmonger[38898]: ". Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] No hooks set for pre-save command. Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:27 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593102 certmonger[40797]: Certificate in file "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" issued by CA and saved. Jan 23 08:04:27 np0005593102 certmonger[38898]: 2026-01-23 08:04:27 [38898] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:28 np0005593102 python3[40813]: ansible-certificate_request Invoked with name=haproxy-storage-cert dns=['np0005593102.storage.ooo.test', 'overcloud.storage.ooo.test'] principal=['haproxy/np0005593102.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012cp "/etc/pki/tls/private/haproxy-storage-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593102 certmonger[38898]: 2026-01-23 08:04:28 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.storage.ooo.test" for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.storage.ooo.test Jan 23 08:04:29 np0005593102 certmonger[40823]: overcloud.storage.ooo.test Jan 23 08:04:29 np0005593102 certmonger[40823]: " for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005593102.storage.ooo.test@OOO.TEST Jan 23 08:04:29 np0005593102 certmonger[40823]: " for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:29 np0005593102 certmonger[40823]: MIID5DCCAswCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTkzMTAyLnN0b3JhZ2Uub29v Jan 23 08:04:29 np0005593102 certmonger[40823]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCu3FeWJ6LT1SMi Jan 23 08:04:29 np0005593102 certmonger[40823]: 9SjrO1nQigzEG76mRC4NpfQSqKmj1Iw3ZF1zR3EX7WqF2P/uAIzyWSqJfQziMd6W Jan 23 08:04:29 np0005593102 certmonger[40823]: as14btjFCCinN6O6vbz1ltMU4A563MdN3igVnbx4WH1Rm8Vi5/dJf1KQzua0UYMa Jan 23 08:04:29 np0005593102 certmonger[40823]: Q/TCsY3SyAGBf08+c0GdF4flLFy+/wiHLqHwcoU3avn5SdhdyDKiLt84ZUZcLGnQ Jan 23 08:04:29 np0005593102 certmonger[40823]: Nt2snTguWTVuYwX/V7hRtFmtRuX/OcD4ApcLwtGweRRLDrzT/zCiXTl8E+XAU4V+ Jan 23 08:04:29 np0005593102 certmonger[40823]: vV53t5fptOH7MbGHBMBT/V1vz7pbcMwu5XAWl5TtrSqhwX6HBk3E0dOXT4EqTxtP Jan 23 08:04:29 np0005593102 certmonger[40823]: bVhvtz7rAgMBAAGgggF1MCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANgAwADEAMgAz Jan 23 08:04:29 np0005593102 certmonger[40823]: ADAAOAAwADQAMgA4MIIBRAYJKoZIhvcNAQkOMYIBNTCCATEwCwYDVR0PBAQDAgWg Jan 23 08:04:29 np0005593102 certmonger[40823]: MIHVBgNVHREEgc0wgcqCHW5wMDAwNTU5MzEwMi5zdG9yYWdlLm9vby50ZXN0ghpv Jan 23 08:04:29 np0005593102 certmonger[40823]: dmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEEAYI3FAIDoDAMLmhhcHJv Jan 23 08:04:29 np0005593102 certmonger[40823]: eHkvbnAwMDA1NTkzMTAyLnN0b3JhZ2Uub29vLnRlc3RAT09PLlRFU1SgTQYGKwYB Jan 23 08:04:29 np0005593102 certmonger[40823]: BQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgbB2hhcHJveHkbHW5wMDAw Jan 23 08:04:29 np0005593102 certmonger[40823]: NTU5MzEwMi5zdG9yYWdlLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr Jan 23 08:04:29 np0005593102 certmonger[40823]: BgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQrD9iTHqj3oxnXxW2PhZaB Jan 23 08:04:29 np0005593102 certmonger[40823]: hrRGLDANBgkqhkiG9w0BAQsFAAOCAQEAZ8yaTJLONBHyygkH3RqT6JaINmSlJ2So Jan 23 08:04:29 np0005593102 certmonger[40823]: jOOxuHu4erNy2MooSPfZGQnPRz3lPnMbf8yCba8icQbAGbqvj3/+WmP65yvO9tvC Jan 23 08:04:29 np0005593102 certmonger[40823]: y9tkL1jq/NCWzhm+fg54MmxucZQg5D87SSbVPbWwH7T3ezlLMnFNXbHOSF2PVgGz Jan 23 08:04:29 np0005593102 certmonger[40823]: /9HbesWVXsvpeXJa81DRW1dXbc2ZMjMaklSzBnmzwsdtYWBhH6svdyOfvIBP6e2X Jan 23 08:04:29 np0005593102 certmonger[40823]: R67eBavV6sUwI34DXTQoB3caNCTmGI4Jl1NVYFbAE8ODbvkPa7WLlVGKe/GqWm7B Jan 23 08:04:29 np0005593102 certmonger[40823]: AVBuXWYb6p4BMhS8ebu2Od5V9zrG+jcCNZnTIIMrSL3QXpIhWMVUkA== Jan 23 08:04:29 np0005593102 certmonger[40823]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:29 np0005593102 certmonger[40823]: " for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArtxXliei09UjIvUo6ztZ0IoMxBu+pkQuDaX0Eqipo9SMN2Rdc0dxF+1qhdj/7gCM8lkqiX0M4jHelmrNeG7YxQgopzejur289ZbTFOAOetzHTd4oFZ28eFh9UZvFYuf3SX9SkM7mtFGDGkP0wrGN0sgBgX9PPnNBnReH5Sxcvv8Ihy6h8HKFN2r5+UnYXcgyoi7fOGVGXCxp0DbdrJ04Llk1bmMF/1e4UbRZrUbl/znA+AKXC8LRsHkUSw680/8wol05fBPlwFOFfr1ed7eX6bTh+zGxhwTAU/1db8+6W3DMLuVwFpeU7a0qocF+hwZNxNHTl0+BKk8bT21Yb7c+6wIDAQAB" for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:29 np0005593102 certmonger[40823]: 2026-01-23 08:04:29 [40823] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[40823]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:29 np0005593102 certmonger[40823]: Certificate: "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" Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Certificate submission still ongoing. Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Certificate submission attempt complete. Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Child status = 0. Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Child output: Jan 23 08:04:29 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:29 np0005593102 certmonger[38898]: MIIFdzCCA9+gAwIBAgIRALjuKZhoNZEwTmJz/CUmlfEwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:29 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:29 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MjlaFw0yODAxMjQwODA0MjlaMDsxETAPBgNVBAoM Jan 23 08:04:29 np0005593102 certmonger[38898]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDIuc3RvcmFnZS5vb28udGVz Jan 23 08:04:29 np0005593102 certmonger[38898]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK7cV5YnotPVIyL1KOs7 Jan 23 08:04:29 np0005593102 certmonger[38898]: WdCKDMQbvqZELg2l9BKoqaPUjDdkXXNHcRftaoXY/+4AjPJZKol9DOIx3pZqzXhu Jan 23 08:04:29 np0005593102 certmonger[38898]: 2MUIKKc3o7q9vPWW0xTgDnrcx03eKBWdvHhYfVGbxWLn90l/UpDO5rRRgxpD9MKx Jan 23 08:04:29 np0005593102 certmonger[38898]: jdLIAYF/Tz5zQZ0Xh+UsXL7/CIcuofByhTdq+flJ2F3IMqIu3zhlRlwsadA23ayd Jan 23 08:04:29 np0005593102 certmonger[38898]: OC5ZNW5jBf9XuFG0Wa1G5f85wPgClwvC0bB5FEsOvNP/MKJdOXwT5cBThX69Xne3 Jan 23 08:04:29 np0005593102 certmonger[38898]: l+m04fsxsYcEwFP9XW/PultwzC7lcBaXlO2tKqHBfocGTcTR05dPgSpPG09tWG+3 Jan 23 08:04:29 np0005593102 certmonger[38898]: PusCAwEAAaOCAfwwggH4MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 08:04:29 np0005593102 certmonger[38898]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:29 np0005593102 certmonger[38898]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 08:04:29 np0005593102 certmonger[38898]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:29 np0005593102 certmonger[38898]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 08:04:29 np0005593102 certmonger[38898]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHjHd3P2 Jan 23 08:04:29 np0005593102 certmonger[38898]: 1MNL85EDEwGXv3Wc5BN+MIHVBgNVHREEgc0wgcqCHW5wMDAwNTU5MzEwMi5zdG9y Jan 23 08:04:29 np0005593102 certmonger[38898]: YWdlLm9vby50ZXN0ghpvdmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEE Jan 23 08:04:29 np0005593102 certmonger[38898]: AYI3FAIDoDAMLmhhcHJveHkvbnAwMDA1NTkzMTAyLnN0b3JhZ2Uub29vLnRlc3RA Jan 23 08:04:29 np0005593102 certmonger[38898]: T09PLlRFU1SgTQYGKwYBBQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgb Jan 23 08:04:29 np0005593102 certmonger[38898]: B2hhcHJveHkbHW5wMDAwNTU5MzEwMi5zdG9yYWdlLm9vby50ZXN0MA0GCSqGSIb3 Jan 23 08:04:29 np0005593102 certmonger[38898]: DQEBCwUAA4IBgQCcBLbQ7Q/d3TTODVEoRoQoaU2DnktOsu8EztucUXOILq9592Pa Jan 23 08:04:29 np0005593102 certmonger[38898]: hsn1ruP4c9HQjnSjD8Nlfzz94UwqnTPjZlVDPvcWCLXkwLIi4buwxXUFO27S6zOg Jan 23 08:04:29 np0005593102 certmonger[38898]: 1bePZ538QaACLKQMqBIA/unXarrO6qMXN9AoDPepQ8TDQlw9hrvNEs1ERLQuotX1 Jan 23 08:04:29 np0005593102 certmonger[38898]: 7lehTp61F6KPJxOPmsLzHOCRQR8u8Akmv3EEPNRQ8LzsC/sH9Y6cl3EuUgn3E1QP Jan 23 08:04:29 np0005593102 certmonger[38898]: OxwYJbo30dho2yfsV/ClLAIwQ++zpyxHVoMaG/92XGiIvUkkkdc6/HGIrS/LfWPw Jan 23 08:04:29 np0005593102 certmonger[38898]: h6TWHKIgkcKvQM+pTxLwvsBKQ7upTJVtUhz614oIhN+NftsC2WZwh2uJFxQo6lq1 Jan 23 08:04:29 np0005593102 certmonger[38898]: 0FYgGP3Cz9ONyO1bwjRSe5n4ElG6uOHnvnSdJUOPY1BNi10ApyVqAjte2+bLNLEn Jan 23 08:04:29 np0005593102 certmonger[38898]: gE+UhK9cuACnPGb8jvoNmE2OZv6O+6Tiqva4IUm0i3kE3eEr18p7TlXGOX2+bVOY Jan 23 08:04:29 np0005593102 certmonger[38898]: xYwzrV8DAExPVg8= Jan 23 08:04:29 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:29 np0005593102 certmonger[38898]: " Jan 23 08:04:29 np0005593102 certmonger[40934]: 2026-01-23 08:04:29 [40934] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:29 np0005593102 certmonger[40934]: MIIFdzCCA9+gAwIBAgIRALjuKZhoNZEwTmJz/CUmlfEwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:29 np0005593102 certmonger[40934]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:29 np0005593102 certmonger[40934]: cml0eTAeFw0yNjAxMjMwODA0MjlaFw0yODAxMjQwODA0MjlaMDsxETAPBgNVBAoM Jan 23 08:04:29 np0005593102 certmonger[40934]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDIuc3RvcmFnZS5vb28udGVz Jan 23 08:04:29 np0005593102 certmonger[40934]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK7cV5YnotPVIyL1KOs7 Jan 23 08:04:29 np0005593102 certmonger[40934]: WdCKDMQbvqZELg2l9BKoqaPUjDdkXXNHcRftaoXY/+4AjPJZKol9DOIx3pZqzXhu Jan 23 08:04:29 np0005593102 certmonger[40934]: 2MUIKKc3o7q9vPWW0xTgDnrcx03eKBWdvHhYfVGbxWLn90l/UpDO5rRRgxpD9MKx Jan 23 08:04:29 np0005593102 certmonger[40934]: jdLIAYF/Tz5zQZ0Xh+UsXL7/CIcuofByhTdq+flJ2F3IMqIu3zhlRlwsadA23ayd Jan 23 08:04:29 np0005593102 certmonger[40934]: OC5ZNW5jBf9XuFG0Wa1G5f85wPgClwvC0bB5FEsOvNP/MKJdOXwT5cBThX69Xne3 Jan 23 08:04:29 np0005593102 certmonger[40934]: l+m04fsxsYcEwFP9XW/PultwzC7lcBaXlO2tKqHBfocGTcTR05dPgSpPG09tWG+3 Jan 23 08:04:29 np0005593102 certmonger[40934]: PusCAwEAAaOCAfwwggH4MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 08:04:29 np0005593102 certmonger[40934]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:29 np0005593102 certmonger[40934]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 08:04:29 np0005593102 certmonger[40934]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:29 np0005593102 certmonger[40934]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 08:04:29 np0005593102 certmonger[40934]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHjHd3P2 Jan 23 08:04:29 np0005593102 certmonger[40934]: 1MNL85EDEwGXv3Wc5BN+MIHVBgNVHREEgc0wgcqCHW5wMDAwNTU5MzEwMi5zdG9y Jan 23 08:04:29 np0005593102 certmonger[40934]: YWdlLm9vby50ZXN0ghpvdmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEE Jan 23 08:04:29 np0005593102 certmonger[40934]: AYI3FAIDoDAMLmhhcHJveHkvbnAwMDA1NTkzMTAyLnN0b3JhZ2Uub29vLnRlc3RA Jan 23 08:04:29 np0005593102 certmonger[40934]: T09PLlRFU1SgTQYGKwYBBQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgb Jan 23 08:04:29 np0005593102 certmonger[40934]: B2hhcHJveHkbHW5wMDAwNTU5MzEwMi5zdG9yYWdlLm9vby50ZXN0MA0GCSqGSIb3 Jan 23 08:04:29 np0005593102 certmonger[40934]: DQEBCwUAA4IBgQCcBLbQ7Q/d3TTODVEoRoQoaU2DnktOsu8EztucUXOILq9592Pa Jan 23 08:04:29 np0005593102 certmonger[40934]: hsn1ruP4c9HQjnSjD8Nlfzz94UwqnTPjZlVDPvcWCLXkwLIi4buwxXUFO27S6zOg Jan 23 08:04:29 np0005593102 certmonger[40934]: 1bePZ538QaACLKQMqBIA/unXarrO6qMXN9AoDPepQ8TDQlw9hrvNEs1ERLQuotX1 Jan 23 08:04:29 np0005593102 certmonger[40934]: 7lehTp61F6KPJxOPmsLzHOCRQR8u8Akmv3EEPNRQ8LzsC/sH9Y6cl3EuUgn3E1QP Jan 23 08:04:29 np0005593102 certmonger[40934]: OxwYJbo30dho2yfsV/ClLAIwQ++zpyxHVoMaG/92XGiIvUkkkdc6/HGIrS/LfWPw Jan 23 08:04:29 np0005593102 certmonger[40934]: h6TWHKIgkcKvQM+pTxLwvsBKQ7upTJVtUhz614oIhN+NftsC2WZwh2uJFxQo6lq1 Jan 23 08:04:29 np0005593102 certmonger[40934]: 0FYgGP3Cz9ONyO1bwjRSe5n4ElG6uOHnvnSdJUOPY1BNi10ApyVqAjte2+bLNLEn Jan 23 08:04:29 np0005593102 certmonger[40934]: gE+UhK9cuACnPGb8jvoNmE2OZv6O+6Tiqva4IUm0i3kE3eEr18p7TlXGOX2+bVOY Jan 23 08:04:29 np0005593102 certmonger[40934]: xYwzrV8DAExPVg8= Jan 23 08:04:29 np0005593102 certmonger[40934]: -----END CERTIFICATE----- Jan 23 08:04:29 np0005593102 certmonger[40934]: ". Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Certificate submission still ongoing. Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Certificate submission postprocessing complete. Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Child status = 0. Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Child output: Jan 23 08:04:29 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nxYwzrV8DAExPVg8=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:29 np0005593102 certmonger[38898]: " Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:29 np0005593102 certmonger[38898]: MIIFdzCCA9+gAwIBAgIRALjuKZhoNZEwTmJz/CUmlfEwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:29 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:29 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MjlaFw0yODAxMjQwODA0MjlaMDsxETAPBgNVBAoM Jan 23 08:04:29 np0005593102 certmonger[38898]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDIuc3RvcmFnZS5vb28udGVz Jan 23 08:04:29 np0005593102 certmonger[38898]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK7cV5YnotPVIyL1KOs7 Jan 23 08:04:29 np0005593102 certmonger[38898]: WdCKDMQbvqZELg2l9BKoqaPUjDdkXXNHcRftaoXY/+4AjPJZKol9DOIx3pZqzXhu Jan 23 08:04:29 np0005593102 certmonger[38898]: 2MUIKKc3o7q9vPWW0xTgDnrcx03eKBWdvHhYfVGbxWLn90l/UpDO5rRRgxpD9MKx Jan 23 08:04:29 np0005593102 certmonger[38898]: jdLIAYF/Tz5zQZ0Xh+UsXL7/CIcuofByhTdq+flJ2F3IMqIu3zhlRlwsadA23ayd Jan 23 08:04:29 np0005593102 certmonger[38898]: OC5ZNW5jBf9XuFG0Wa1G5f85wPgClwvC0bB5FEsOvNP/MKJdOXwT5cBThX69Xne3 Jan 23 08:04:29 np0005593102 certmonger[38898]: l+m04fsxsYcEwFP9XW/PultwzC7lcBaXlO2tKqHBfocGTcTR05dPgSpPG09tWG+3 Jan 23 08:04:29 np0005593102 certmonger[38898]: PusCAwEAAaOCAfwwggH4MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 08:04:29 np0005593102 certmonger[38898]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:29 np0005593102 certmonger[38898]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 08:04:29 np0005593102 certmonger[38898]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:29 np0005593102 certmonger[38898]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 08:04:29 np0005593102 certmonger[38898]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHjHd3P2 Jan 23 08:04:29 np0005593102 certmonger[38898]: 1MNL85EDEwGXv3Wc5BN+MIHVBgNVHREEgc0wgcqCHW5wMDAwNTU5MzEwMi5zdG9y Jan 23 08:04:29 np0005593102 certmonger[38898]: YWdlLm9vby50ZXN0ghpvdmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEE Jan 23 08:04:29 np0005593102 certmonger[38898]: AYI3FAIDoDAMLmhhcHJveHkvbnAwMDA1NTkzMTAyLnN0b3JhZ2Uub29vLnRlc3RA Jan 23 08:04:29 np0005593102 certmonger[38898]: T09PLlRFU1SgTQYGKwYBBQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgb Jan 23 08:04:29 np0005593102 certmonger[38898]: B2hhcHJveHkbHW5wMDAwNTU5MzEwMi5zdG9yYWdlLm9vby50ZXN0MA0GCSqGSIb3 Jan 23 08:04:29 np0005593102 certmonger[38898]: DQEBCwUAA4IBgQCcBLbQ7Q/d3TTODVEoRoQoaU2DnktOsu8EztucUXOILq9592Pa Jan 23 08:04:29 np0005593102 certmonger[38898]: hsn1ruP4c9HQjnSjD8Nlfzz94UwqnTPjZlVDPvcWCLXkwLIi4buwxXUFO27S6zOg Jan 23 08:04:29 np0005593102 certmonger[38898]: 1bePZ538QaACLKQMqBIA/unXarrO6qMXN9AoDPepQ8TDQlw9hrvNEs1ERLQuotX1 Jan 23 08:04:29 np0005593102 certmonger[38898]: 7lehTp61F6KPJxOPmsLzHOCRQR8u8Akmv3EEPNRQ8LzsC/sH9Y6cl3EuUgn3E1QP Jan 23 08:04:29 np0005593102 certmonger[38898]: OxwYJbo30dho2yfsV/ClLAIwQ++zpyxHVoMaG/92XGiIvUkkkdc6/HGIrS/LfWPw Jan 23 08:04:29 np0005593102 certmonger[38898]: h6TWHKIgkcKvQM+pTxLwvsBKQ7upTJVtUhz614oIhN+NftsC2WZwh2uJFxQo6lq1 Jan 23 08:04:29 np0005593102 certmonger[38898]: 0FYgGP3Cz9ONyO1bwjRSe5n4ElG6uOHnvnSdJUOPY1BNi10ApyVqAjte2+bLNLEn Jan 23 08:04:29 np0005593102 certmonger[38898]: gE+UhK9cuACnPGb8jvoNmE2OZv6O+6Tiqva4IUm0i3kE3eEr18p7TlXGOX2+bVOY Jan 23 08:04:29 np0005593102 certmonger[38898]: xYwzrV8DAExPVg8= Jan 23 08:04:29 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:29 np0005593102 certmonger[38898]: ". Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] No hooks set for pre-save command. Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593102 certmonger[38898]: 2026-01-23 08:04:29 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:30 np0005593102 certmonger[38898]: 2026-01-23 08:04:30 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:30 np0005593102 certmonger[38898]: 2026-01-23 08:04:30 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:30 np0005593102 certmonger[38898]: 2026-01-23 08:04:30 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:30 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:30 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:30 np0005593102 certmonger[38898]: 2026-01-23 08:04:30 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:30 np0005593102 certmonger[38898]: 2026-01-23 08:04:30 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:30 np0005593102 certmonger[41013]: Certificate in file "/etc/pki/tls/certs/haproxy-storage-cert.crt" issued by CA and saved. Jan 23 08:04:30 np0005593102 certmonger[38898]: 2026-01-23 08:04:30 [38898] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:31 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:31 np0005593102 python3[41029]: ansible-certificate_request Invoked with name=haproxy-storage_mgmt-cert dns=['np0005593102.storagemgmt.ooo.test', 'overcloud.storagemgmt.ooo.test'] principal=['haproxy/np0005593102.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012cp "/etc/pki/tls/private/haproxy-storage_mgmt-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:31 np0005593102 certmonger[38898]: 2026-01-23 08:04:31 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.storagemgmt.ooo.test" for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.storagemgmt.ooo.test Jan 23 08:04:32 np0005593102 certmonger[41039]: overcloud.storagemgmt.ooo.test Jan 23 08:04:32 np0005593102 certmonger[41039]: " for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005593102.storagemgmt.ooo.test@OOO.TEST Jan 23 08:04:32 np0005593102 certmonger[41039]: " for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:32 np0005593102 certmonger[41039]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLnN0b3JhZ2VtZ210 Jan 23 08:04:32 np0005593102 certmonger[41039]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2seol3KK Jan 23 08:04:32 np0005593102 certmonger[41039]: 2x/Geyw/eem4Xuuq+cDqLnYa0eiUgkivSlvlXW73icaKj+YAmfYYTb+UMzS0yJXJ Jan 23 08:04:32 np0005593102 certmonger[41039]: kXKJW7hBHEsu/GWJTexnnr6lNQbqH09zzLILvDVSQOAAZWDzwmXXo5/0F+xQlMRo Jan 23 08:04:32 np0005593102 certmonger[41039]: Zwqc659HH0VSFiNBycci20VnWXrgqH0ZHywOiEVB4TyPXPTwg5W6JKC+l1JkaFiV Jan 23 08:04:32 np0005593102 certmonger[41039]: tALIvZML59A+NdecXsAnND8eVX45Q8xJqHh1iiB+xiUHZNebe/IE53HH0XjDg9VV Jan 23 08:04:32 np0005593102 certmonger[41039]: b1qHSygubA8un+4UJyH52Yq+u7FeSCQC7UrhRdjNKfDlS5oe+OQYqjv+kdbIPb6y Jan 23 08:04:32 np0005593102 certmonger[41039]: NvXXUvqlxX7jpQIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:04:32 np0005593102 certmonger[41039]: ADIAMwAwADgAMAA0ADMAMTCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Jan 23 08:04:32 np0005593102 certmonger[41039]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29v Jan 23 08:04:32 np0005593102 certmonger[41039]: LnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28udGVzdKBCBgorBgEEAYI3 Jan 23 08:04:32 np0005593102 certmonger[41039]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAyLnN0b3JhZ2VtZ210Lm9vby50ZXN0 Jan 23 08:04:32 np0005593102 certmonger[41039]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Jan 23 08:04:32 np0005593102 certmonger[41039]: GwdoYXByb3h5GyFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29vLnRlc3QwHQYD Jan 23 08:04:32 np0005593102 certmonger[41039]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Jan 23 08:04:32 np0005593102 certmonger[41039]: BBYEFP/UfO1ZkCFnd/jopN9vqmRJbh6eMA0GCSqGSIb3DQEBCwUAA4IBAQAWKx6C Jan 23 08:04:32 np0005593102 certmonger[41039]: zDmTomOSEFtzqZ3MfgsioJi4vlDGAxSbKh2cP5XPes7kCjJJIORdWZVt4ZsrX1Gv Jan 23 08:04:32 np0005593102 certmonger[41039]: 1Tm95Co46BmhzhOVkxwkCgyqE1y0Af8kKNvBmwmjES1jILgL2A9gXYe0jizwnu+x Jan 23 08:04:32 np0005593102 certmonger[41039]: uBfQozCg00YCPIkdo/F7DaB17aPn83fc+hHrsGo0PLCqHBdCz3hfb8L1jrEq6WV/ Jan 23 08:04:32 np0005593102 certmonger[41039]: ts32zRq8BXWi/9ug/5epLIjNv9XieNyOoSRheGCqKK0AY6DpHR7lcTFHCT5KXf3U Jan 23 08:04:32 np0005593102 certmonger[41039]: QFhY0Q+84xISBeUJLJMHMYLPf6Bcv6cVsjo8sS9iKZI4g5IL+M+73g6Rl8jkcaSr Jan 23 08:04:32 np0005593102 certmonger[41039]: kKaMpKyhqX2qWoid Jan 23 08:04:32 np0005593102 certmonger[41039]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:32 np0005593102 certmonger[41039]: " for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2seol3KK2x/Geyw/eem4Xuuq+cDqLnYa0eiUgkivSlvlXW73icaKj+YAmfYYTb+UMzS0yJXJkXKJW7hBHEsu/GWJTexnnr6lNQbqH09zzLILvDVSQOAAZWDzwmXXo5/0F+xQlMRoZwqc659HH0VSFiNBycci20VnWXrgqH0ZHywOiEVB4TyPXPTwg5W6JKC+l1JkaFiVtALIvZML59A+NdecXsAnND8eVX45Q8xJqHh1iiB+xiUHZNebe/IE53HH0XjDg9VVb1qHSygubA8un+4UJyH52Yq+u7FeSCQC7UrhRdjNKfDlS5oe+OQYqjv+kdbIPb6yNvXXUvqlxX7jpQIDAQAB" for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:32 np0005593102 certmonger[41039]: 2026-01-23 08:04:32 [41039] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[41039]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:32 np0005593102 certmonger[41039]: Certificate: "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" Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Certificate submission still ongoing. Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Certificate submission attempt complete. Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Child status = 0. Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Child output: Jan 23 08:04:32 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:32 np0005593102 certmonger[38898]: MIIFizCCA/OgAwIBAgIRAJNleY8pvcP27mDH9xjxYGwwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:32 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:32 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MzJaFw0yODAxMjQwODA0MzJaMD8xETAPBgNVBAoM Jan 23 08:04:32 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29v Jan 23 08:04:32 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDax6iXcorbH8Z7 Jan 23 08:04:32 np0005593102 certmonger[38898]: LD956bhe66r5wOoudhrR6JSCSK9KW+VdbveJxoqP5gCZ9hhNv5QzNLTIlcmRcolb Jan 23 08:04:32 np0005593102 certmonger[38898]: uEEcSy78ZYlN7GeevqU1BuofT3PMsgu8NVJA4ABlYPPCZdejn/QX7FCUxGhnCpzr Jan 23 08:04:32 np0005593102 certmonger[38898]: n0cfRVIWI0HJxyLbRWdZeuCofRkfLA6IRUHhPI9c9PCDlbokoL6XUmRoWJW0Asi9 Jan 23 08:04:32 np0005593102 certmonger[38898]: kwvn0D4115xewCc0Px5VfjlDzEmoeHWKIH7GJQdk15t78gTnccfReMOD1VVvWodL Jan 23 08:04:32 np0005593102 certmonger[38898]: KC5sDy6f7hQnIfnZir67sV5IJALtSuFF2M0p8OVLmh745BiqO/6R1sg9vrI29ddS Jan 23 08:04:32 np0005593102 certmonger[38898]: +qXFfuOlAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:32 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:32 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:32 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:32 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:32 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBS7 Jan 23 08:04:32 np0005593102 certmonger[38898]: /wwYj6ygEDCcC4d5M9F0iFFEszCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDIu Jan 23 08:04:32 np0005593102 certmonger[38898]: c3RvcmFnZW1nbXQub29vLnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28u Jan 23 08:04:32 np0005593102 certmonger[38898]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAyLnN0b3Jh Jan 23 08:04:32 np0005593102 certmonger[38898]: Z2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Jan 23 08:04:32 np0005593102 certmonger[38898]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDIuc3RvcmFnZW1n Jan 23 08:04:32 np0005593102 certmonger[38898]: bXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBACYUmP6iLT1vntbb+SZ/hJjq Jan 23 08:04:32 np0005593102 certmonger[38898]: 7l3yaQHG7c0CpMGA/vSm9CT99iB6YM66cnu8Wnaj72k2pY5sVK79SAHy84uzBjZQ Jan 23 08:04:32 np0005593102 certmonger[38898]: C1ryrIfFQA+eD/b1BgBULXgS0L07a/ApFq9SMHbzvCKpfp/mMGQrm7LqDv7Hsw1Q Jan 23 08:04:32 np0005593102 certmonger[38898]: qwhcYzRpzIqm56H/OBTO4CB7QiyrtWl3QbAk8bM9+stdFjCbg8AdTMZ0VNC2bSmP Jan 23 08:04:32 np0005593102 certmonger[38898]: Lwsf41oL9G6LrySaONgWvvEJi5QV/94PsZQ0g2WwY0hHuo4kGKp0dGyoJUXFMMcs Jan 23 08:04:32 np0005593102 certmonger[38898]: 3NuQMP9GyiyXh2o+erICSL2buuSfzS1M2kklSTd906Z1qU385kcqa3GT+RLGLMs0 Jan 23 08:04:32 np0005593102 certmonger[38898]: 3pOAVyVFgEXXlAdrb1mNU5yxhMgAvhnLVLKilk8gWIA38bbzQn1CTuck//NU/Ok8 Jan 23 08:04:32 np0005593102 certmonger[38898]: sPyFMraEVAANxcs3fq1ug7kh9ZxBLlSfz6rxmyxYbuqdnjRSIQRgWBFFOqvvs86d Jan 23 08:04:32 np0005593102 certmonger[38898]: EZWat2peFbqFBLmPNUJYuBNL6TPsr4f4tutv2DnqOg== Jan 23 08:04:32 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:32 np0005593102 certmonger[38898]: " Jan 23 08:04:32 np0005593102 certmonger[41041]: 2026-01-23 08:04:32 [41041] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:32 np0005593102 certmonger[41041]: MIIFizCCA/OgAwIBAgIRAJNleY8pvcP27mDH9xjxYGwwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:32 np0005593102 certmonger[41041]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:32 np0005593102 certmonger[41041]: cml0eTAeFw0yNjAxMjMwODA0MzJaFw0yODAxMjQwODA0MzJaMD8xETAPBgNVBAoM Jan 23 08:04:32 np0005593102 certmonger[41041]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29v Jan 23 08:04:32 np0005593102 certmonger[41041]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDax6iXcorbH8Z7 Jan 23 08:04:32 np0005593102 certmonger[41041]: LD956bhe66r5wOoudhrR6JSCSK9KW+VdbveJxoqP5gCZ9hhNv5QzNLTIlcmRcolb Jan 23 08:04:32 np0005593102 certmonger[41041]: uEEcSy78ZYlN7GeevqU1BuofT3PMsgu8NVJA4ABlYPPCZdejn/QX7FCUxGhnCpzr Jan 23 08:04:32 np0005593102 certmonger[41041]: n0cfRVIWI0HJxyLbRWdZeuCofRkfLA6IRUHhPI9c9PCDlbokoL6XUmRoWJW0Asi9 Jan 23 08:04:32 np0005593102 certmonger[41041]: kwvn0D4115xewCc0Px5VfjlDzEmoeHWKIH7GJQdk15t78gTnccfReMOD1VVvWodL Jan 23 08:04:32 np0005593102 certmonger[41041]: KC5sDy6f7hQnIfnZir67sV5IJALtSuFF2M0p8OVLmh745BiqO/6R1sg9vrI29ddS Jan 23 08:04:32 np0005593102 certmonger[41041]: +qXFfuOlAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:32 np0005593102 certmonger[41041]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:32 np0005593102 certmonger[41041]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:32 np0005593102 certmonger[41041]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:32 np0005593102 certmonger[41041]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:32 np0005593102 certmonger[41041]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBS7 Jan 23 08:04:32 np0005593102 certmonger[41041]: /wwYj6ygEDCcC4d5M9F0iFFEszCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDIu Jan 23 08:04:32 np0005593102 certmonger[41041]: c3RvcmFnZW1nbXQub29vLnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28u Jan 23 08:04:32 np0005593102 certmonger[41041]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAyLnN0b3Jh Jan 23 08:04:32 np0005593102 certmonger[41041]: Z2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Jan 23 08:04:32 np0005593102 certmonger[41041]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDIuc3RvcmFnZW1n Jan 23 08:04:32 np0005593102 certmonger[41041]: bXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBACYUmP6iLT1vntbb+SZ/hJjq Jan 23 08:04:32 np0005593102 certmonger[41041]: 7l3yaQHG7c0CpMGA/vSm9CT99iB6YM66cnu8Wnaj72k2pY5sVK79SAHy84uzBjZQ Jan 23 08:04:32 np0005593102 certmonger[41041]: C1ryrIfFQA+eD/b1BgBULXgS0L07a/ApFq9SMHbzvCKpfp/mMGQrm7LqDv7Hsw1Q Jan 23 08:04:32 np0005593102 certmonger[41041]: qwhcYzRpzIqm56H/OBTO4CB7QiyrtWl3QbAk8bM9+stdFjCbg8AdTMZ0VNC2bSmP Jan 23 08:04:32 np0005593102 certmonger[41041]: Lwsf41oL9G6LrySaONgWvvEJi5QV/94PsZQ0g2WwY0hHuo4kGKp0dGyoJUXFMMcs Jan 23 08:04:32 np0005593102 certmonger[41041]: 3NuQMP9GyiyXh2o+erICSL2buuSfzS1M2kklSTd906Z1qU385kcqa3GT+RLGLMs0 Jan 23 08:04:32 np0005593102 certmonger[41041]: 3pOAVyVFgEXXlAdrb1mNU5yxhMgAvhnLVLKilk8gWIA38bbzQn1CTuck//NU/Ok8 Jan 23 08:04:32 np0005593102 certmonger[41041]: sPyFMraEVAANxcs3fq1ug7kh9ZxBLlSfz6rxmyxYbuqdnjRSIQRgWBFFOqvvs86d Jan 23 08:04:32 np0005593102 certmonger[41041]: EZWat2peFbqFBLmPNUJYuBNL6TPsr4f4tutv2DnqOg== Jan 23 08:04:32 np0005593102 certmonger[41041]: -----END CERTIFICATE----- Jan 23 08:04:32 np0005593102 certmonger[41041]: ". Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Certificate submission still ongoing. Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Certificate submission postprocessing complete. Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Child status = 0. Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Child output: Jan 23 08:04:32 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFizCCA/OgAwIBAgIRAJNleY8pvcP27mDH9xjxYGwwDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAxMjMwODA0MzJaFw0yODAxMjQwODA0MzJaMD8xETAPBgNVBAoM\nCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29v\nLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDax6iXcorbH8Z7\nLD956bhe66r5wOoudhrR6JSCSK9KW+VdbveJxoqP5gCZ9hhNv5QzNLTIlcmRcolb\nuEEcSy78ZYlN7GeevqU1BuofT3PMsgu8NVJA4ABlYPPCZdejn/QX7FCUxGhnCpzr\nn0cfRVIWI0HJxyLbRWdZeuCofRkfLA6IRUHhPI9c9PCDlbokoL6XUmRoWJW0Asi9\nkwvn0D4115xewCc0Px5VfjlDzEmoeHWKIH7GJQdk15t78gTnccfReMOD1VVvWodL\nKC5sDy6f7hQnIfnZir67sV5IJALtSuFF2M0p8OVLmh745BiqO/6R1sg9vrI29ddS\n+qXFfuOlAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt\ndyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB\nBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp\ncGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBS7\n/wwYj6ygEDCcC4d5M9F0iFFEszCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDIu\nc3RvcmFnZW1nbXQub29vLnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28u\ndGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAyLnN0b3Jh\nZ2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF\nU1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDIuc3RvcmFnZW1n\nbXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBACYUmP6iLT1vntbb+SZ/hJjq\n7l3yaQHG7c0CpMGA/vSm9CT99iB6YM66cnu8Wnaj72k2pY5sVK79SAHy84uzBjZQ\nC1ryrIfFQA+eD/b1BgBULXgS0L07a/ApFq9SMHbzvCKpfp/mMGQrm7LqDv7Hsw1Q\nqwhcYzRpzIqm56H/OBTO4CB7QiyrtWl3QbAk8bM9+stdFjCbg8AdTMZ0VNC2bSmP\nLwsf41oL9G6LrySaONgWvvEJi5QV/94PsZQ0g2WwY0hHuo4kGKp0dGyoJUXFMMcs\n3NuQMP9GyiyXh2o+erICSL2buuSfzS1M2kklSTd906Z1qU385kcqa3GT+RLGLMs0\n3pOAVyVFgEXXlAdrb1mNU5yxhMgAvhnLVLKilk8gWIA38bbzQn1CTuck//NU/Ok8\nsPyFMraEVAANxcs3fq1ug7kh9ZxBLlSfz6rxmyxYbuqdnjRSIQRgWBFFOqvvs86d\nEZWat2peFbqFBLmPNUJYuBNL6TPsr4f4tutv2DnqOg==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:32 np0005593102 certmonger[38898]: " Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:32 np0005593102 certmonger[38898]: MIIFizCCA/OgAwIBAgIRAJNleY8pvcP27mDH9xjxYGwwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:32 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:32 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MzJaFw0yODAxMjQwODA0MzJaMD8xETAPBgNVBAoM Jan 23 08:04:32 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuc3RvcmFnZW1nbXQub29v Jan 23 08:04:32 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDax6iXcorbH8Z7 Jan 23 08:04:32 np0005593102 certmonger[38898]: LD956bhe66r5wOoudhrR6JSCSK9KW+VdbveJxoqP5gCZ9hhNv5QzNLTIlcmRcolb Jan 23 08:04:32 np0005593102 certmonger[38898]: uEEcSy78ZYlN7GeevqU1BuofT3PMsgu8NVJA4ABlYPPCZdejn/QX7FCUxGhnCpzr Jan 23 08:04:32 np0005593102 certmonger[38898]: n0cfRVIWI0HJxyLbRWdZeuCofRkfLA6IRUHhPI9c9PCDlbokoL6XUmRoWJW0Asi9 Jan 23 08:04:32 np0005593102 certmonger[38898]: kwvn0D4115xewCc0Px5VfjlDzEmoeHWKIH7GJQdk15t78gTnccfReMOD1VVvWodL Jan 23 08:04:32 np0005593102 certmonger[38898]: KC5sDy6f7hQnIfnZir67sV5IJALtSuFF2M0p8OVLmh745BiqO/6R1sg9vrI29ddS Jan 23 08:04:32 np0005593102 certmonger[38898]: +qXFfuOlAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:32 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:32 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:32 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:32 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:32 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBS7 Jan 23 08:04:32 np0005593102 certmonger[38898]: /wwYj6ygEDCcC4d5M9F0iFFEszCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDIu Jan 23 08:04:32 np0005593102 certmonger[38898]: c3RvcmFnZW1nbXQub29vLnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28u Jan 23 08:04:32 np0005593102 certmonger[38898]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAyLnN0b3Jh Jan 23 08:04:32 np0005593102 certmonger[38898]: Z2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Jan 23 08:04:32 np0005593102 certmonger[38898]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDIuc3RvcmFnZW1n Jan 23 08:04:32 np0005593102 certmonger[38898]: bXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBACYUmP6iLT1vntbb+SZ/hJjq Jan 23 08:04:32 np0005593102 certmonger[38898]: 7l3yaQHG7c0CpMGA/vSm9CT99iB6YM66cnu8Wnaj72k2pY5sVK79SAHy84uzBjZQ Jan 23 08:04:32 np0005593102 certmonger[38898]: C1ryrIfFQA+eD/b1BgBULXgS0L07a/ApFq9SMHbzvCKpfp/mMGQrm7LqDv7Hsw1Q Jan 23 08:04:32 np0005593102 certmonger[38898]: qwhcYzRpzIqm56H/OBTO4CB7QiyrtWl3QbAk8bM9+stdFjCbg8AdTMZ0VNC2bSmP Jan 23 08:04:32 np0005593102 certmonger[38898]: Lwsf41oL9G6LrySaONgWvvEJi5QV/94PsZQ0g2WwY0hHuo4kGKp0dGyoJUXFMMcs Jan 23 08:04:32 np0005593102 certmonger[38898]: 3NuQMP9GyiyXh2o+erICSL2buuSfzS1M2kklSTd906Z1qU385kcqa3GT+RLGLMs0 Jan 23 08:04:32 np0005593102 certmonger[38898]: 3pOAVyVFgEXXlAdrb1mNU5yxhMgAvhnLVLKilk8gWIA38bbzQn1CTuck//NU/Ok8 Jan 23 08:04:32 np0005593102 certmonger[38898]: sPyFMraEVAANxcs3fq1ug7kh9ZxBLlSfz6rxmyxYbuqdnjRSIQRgWBFFOqvvs86d Jan 23 08:04:32 np0005593102 certmonger[38898]: EZWat2peFbqFBLmPNUJYuBNL6TPsr4f4tutv2DnqOg== Jan 23 08:04:32 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:32 np0005593102 certmonger[38898]: ". Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] No hooks set for pre-save command. Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:32 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:32 np0005593102 certmonger[41109]: Certificate in file "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" issued by CA and saved. Jan 23 08:04:32 np0005593102 certmonger[38898]: 2026-01-23 08:04:32 [38898] Wrote to /var/lib/certmonger/requests/20260123080431 Jan 23 08:04:33 np0005593102 python3[41125]: ansible-certificate_request Invoked with name=haproxy-internal_api-cert dns=['np0005593102.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['haproxy/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012cp "/etc/pki/tls/private/haproxy-internal_api-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:33 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:33 np0005593102 certmonger[38898]: 2026-01-23 08:04:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:04:34 np0005593102 certmonger[41135]: overcloud.internalapi.ooo.test Jan 23 08:04:34 np0005593102 certmonger[41135]: " for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:04:34 np0005593102 certmonger[41135]: " for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:34 np0005593102 certmonger[41135]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:04:34 np0005593102 certmonger[41135]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtb72528x Jan 23 08:04:34 np0005593102 certmonger[41135]: /JPGlCcL0f8h4W4lBkd4hu4SNI5oGjyz0jk0YsVv4Q/6d+wVFPVC5xUUadq9n0PX Jan 23 08:04:34 np0005593102 certmonger[41135]: GJupKm8Ak9Gz+6Ap8Ah7OqBnNdIe5vbm3PATXSgi0HwBqtAQ8MEQuhNMcyv+gABt Jan 23 08:04:34 np0005593102 certmonger[41135]: rGMeJJlOz796+PFwhJweNYbdXy73h+/DNW3UxQBxjsEPVhbjLZD+4qp20qB8/Yfv Jan 23 08:04:34 np0005593102 certmonger[41135]: UybP6MGBrGWuXzvWoEaB8juTp/7UCr48jpzZLaZ1wam4UTlAiFTLubqhxIbb5nTv Jan 23 08:04:34 np0005593102 certmonger[41135]: ltkv4hvzyne/ZmUSniAu21wRvcAHcjDnRYA73/q7gh1tNwBsW+173YJPtTmsIPF8 Jan 23 08:04:34 np0005593102 certmonger[41135]: P1AJZ6f4QSdkHwIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:04:34 np0005593102 certmonger[41135]: ADIAMwAwADgAMAA0ADMAMzCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Jan 23 08:04:34 np0005593102 certmonger[41135]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:04:34 np0005593102 certmonger[41135]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3 Jan 23 08:04:34 np0005593102 certmonger[41135]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAyLmludGVybmFsYXBpLm9vby50ZXN0 Jan 23 08:04:34 np0005593102 certmonger[41135]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Jan 23 08:04:34 np0005593102 certmonger[41135]: GwdoYXByb3h5GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYD Jan 23 08:04:34 np0005593102 certmonger[41135]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Jan 23 08:04:34 np0005593102 certmonger[41135]: BBYEFMfZJ9uwi9QvSKwIoNfUpMhSHJn5MA0GCSqGSIb3DQEBCwUAA4IBAQB1igXU Jan 23 08:04:34 np0005593102 certmonger[41135]: bPtiE0rYXuUmxcywVz2VAdRa3HHukuWCMzDBJ/WSPXnmMtdLtdYOY1qApHkjYfiY Jan 23 08:04:34 np0005593102 certmonger[41135]: /UI8SjN7/deH9LWCaAMbGwnifaVDhYOZC0dQTREXeIpXJp7gk7kYkZ+k8Xy2Ngxm Jan 23 08:04:34 np0005593102 certmonger[41135]: d0438fm4Wi3oP5EYpjRdpWerlqNQZdW2jOXxxbeZ/PflBdXHcXFyaWMJWNz7b8wJ Jan 23 08:04:34 np0005593102 certmonger[41135]: VM0atU/KtuM2QNwdCK8Pkqi6HBuBk1oI1VjRVK5P5hQAPu2RzhQbFVQNtxQAqMQE Jan 23 08:04:34 np0005593102 certmonger[41135]: tfqqm5jgWsSeOo/iKRQd/l+0bub39EVO0ZwQ+d21ZARJDV15HLZUV2jAFki+Ooi8 Jan 23 08:04:34 np0005593102 certmonger[41135]: qzldhwQgsZPy4a/S Jan 23 08:04:34 np0005593102 certmonger[41135]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:34 np0005593102 certmonger[41135]: " for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1vvbnbzH8k8aUJwvR/yHhbiUGR3iG7hI0jmgaPLPSOTRixW/hD/p37BUU9ULnFRRp2r2fQ9cYm6kqbwCT0bP7oCnwCHs6oGc10h7m9ubc8BNdKCLQfAGq0BDwwRC6E0xzK/6AAG2sYx4kmU7Pv3r48XCEnB41ht1fLveH78M1bdTFAHGOwQ9WFuMtkP7iqnbSoHz9h+9TJs/owYGsZa5fO9agRoHyO5On/tQKvjyOnNktpnXBqbhROUCIVMu5uqHEhtvmdO+W2S/iG/PKd79mZRKeIC7bXBG9wAdyMOdFgDvf+ruCHW03AGxb7Xvdgk+1Oawg8Xw/UAlnp/hBJ2QfAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAqvRq6ZY6/RCSGskTx0HIH6DWfUCGnHtPKHbm2PsflndXKDfqAgUPUWXKHHzfCPkQAcG/d4+27WLLPzLqAQB96+KG04bVKkEXp1YrjX8WINRvHQfLm10W1g0qKh1Jp6vhwu1j31xvkXJARjkNkV6OjyCTpzrnpdf4Iml0CH1jyIs9pL35f9/DfgUUwcM8td8ThwtAQgaAVXEmwftH2MRA+EfcY+db3JlqpeVDtEPfCqO+oWONr+1hdYKvvrxgSALkE6hl+10fxLCBgDxotAXWEFB1sSVAW3/r1vRkF/N7iYIzNI2KVXSLaX4ZCIqWPs+hAHwj+/PDthLbFSZNjrUGrA==" for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtb72528x/JPGlCcL0f8h4W4lBkd4hu4SNI5oGjyz0jk0YsVv4Q/6d+wVFPVC5xUUadq9n0PXGJupKm8Ak9Gz+6Ap8Ah7OqBnNdIe5vbm3PATXSgi0HwBqtAQ8MEQuhNMcyv+gABtrGMeJJlOz796+PFwhJweNYbdXy73h+/DNW3UxQBxjsEPVhbjLZD+4qp20qB8/YfvUybP6MGBrGWuXzvWoEaB8juTp/7UCr48jpzZLaZ1wam4UTlAiFTLubqhxIbb5nTvltkv4hvzyne/ZmUSniAu21wRvcAHcjDnRYA73/q7gh1tNwBsW+173YJPtTmsIPF8P1AJZ6f4QSdkHwIDAQAB" for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:34 np0005593102 certmonger[41135]: 2026-01-23 08:04:34 [41135] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[41135]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:34 np0005593102 certmonger[41135]: Certificate: "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" Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Certificate submission still ongoing. Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Certificate submission attempt complete. Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Child status = 0. Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Child output: Jan 23 08:04:34 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:34 np0005593102 certmonger[38898]: MIIFizCCA/OgAwIBAgIRAObBiqwvDlLwilpgZLgTGIAwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:34 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:34 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MzRaFw0yODAxMjQwODA0MzRaMD8xETAPBgNVBAoM Jan 23 08:04:34 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:04:34 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1vvbnbzH8k8aU Jan 23 08:04:34 np0005593102 certmonger[38898]: JwvR/yHhbiUGR3iG7hI0jmgaPLPSOTRixW/hD/p37BUU9ULnFRRp2r2fQ9cYm6kq Jan 23 08:04:34 np0005593102 certmonger[38898]: bwCT0bP7oCnwCHs6oGc10h7m9ubc8BNdKCLQfAGq0BDwwRC6E0xzK/6AAG2sYx4k Jan 23 08:04:34 np0005593102 certmonger[38898]: mU7Pv3r48XCEnB41ht1fLveH78M1bdTFAHGOwQ9WFuMtkP7iqnbSoHz9h+9TJs/o Jan 23 08:04:34 np0005593102 certmonger[38898]: wYGsZa5fO9agRoHyO5On/tQKvjyOnNktpnXBqbhROUCIVMu5uqHEhtvmdO+W2S/i Jan 23 08:04:34 np0005593102 certmonger[38898]: G/PKd79mZRKeIC7bXBG9wAdyMOdFgDvf+ruCHW03AGxb7Xvdgk+1Oawg8Xw/UAln Jan 23 08:04:34 np0005593102 certmonger[38898]: p/hBJ2QfAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:34 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:34 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:34 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:34 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:34 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRb Jan 23 08:04:34 np0005593102 certmonger[38898]: gnuUKBYdqkYwgxaYibzdLCmrOjCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDIu Jan 23 08:04:34 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Jan 23 08:04:34 np0005593102 certmonger[38898]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAyLmludGVy Jan 23 08:04:34 np0005593102 certmonger[38898]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Jan 23 08:04:34 np0005593102 certmonger[38898]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxh Jan 23 08:04:34 np0005593102 certmonger[38898]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAJtDVLoKGLcLsBKZa1JcLhvf Jan 23 08:04:34 np0005593102 certmonger[38898]: 1g6Pm+YSGffjvawsznfO6BsRXKmAAxkRVcdNfyVJamprtvhMzHQTZEW8QEn6k3Jv Jan 23 08:04:34 np0005593102 certmonger[38898]: emD9HFannE8WQPng3IIUvlyqPYrr3yml/XbkvC3gDAvBRahTDy0CXWz2/kL6L6a6 Jan 23 08:04:34 np0005593102 certmonger[38898]: v5JHS3fm7bEK0GvjGUJp3musmCZPrsd/oHO6Pd1UMQV7DHIxOav8YPqxa3YS9aJs Jan 23 08:04:34 np0005593102 certmonger[38898]: wHLrg9NYKZtw2YDPHtqV3n+iCxTZNwDqeB5NpDKOAc7YstxWoE1syJW0IDEvop15 Jan 23 08:04:34 np0005593102 certmonger[38898]: Bif+l8yEKyAdlKHC0SYmpvbiNDkkUTEF49BbXqFJJcY0O3vQao6uk1Ku/TPpxkGF Jan 23 08:04:34 np0005593102 certmonger[38898]: EtrFpITEk2kL78BR6MQC9x73jadMpQD4lN+YL7DOUPD5fSh9nY2xMqeACXIV7gTJ Jan 23 08:04:34 np0005593102 certmonger[38898]: UhSir+06ZL/KYzzvGZNrXN7UHphbXVPlQCUJux3DlyQ2EynT9MxypBLfjEc1Q5Yn Jan 23 08:04:34 np0005593102 certmonger[38898]: M8W/4uj9PVi3/SPTkxYgjUx6OupwBF9O7OePuavTkg== Jan 23 08:04:34 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:34 np0005593102 certmonger[38898]: " Jan 23 08:04:34 np0005593102 certmonger[41137]: 2026-01-23 08:04:34 [41137] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:34 np0005593102 certmonger[41137]: MIIFizCCA/OgAwIBAgIRAObBiqwvDlLwilpgZLgTGIAwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:34 np0005593102 certmonger[41137]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:34 np0005593102 certmonger[41137]: cml0eTAeFw0yNjAxMjMwODA0MzRaFw0yODAxMjQwODA0MzRaMD8xETAPBgNVBAoM Jan 23 08:04:34 np0005593102 certmonger[41137]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:04:34 np0005593102 certmonger[41137]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1vvbnbzH8k8aU Jan 23 08:04:34 np0005593102 certmonger[41137]: JwvR/yHhbiUGR3iG7hI0jmgaPLPSOTRixW/hD/p37BUU9ULnFRRp2r2fQ9cYm6kq Jan 23 08:04:34 np0005593102 certmonger[41137]: bwCT0bP7oCnwCHs6oGc10h7m9ubc8BNdKCLQfAGq0BDwwRC6E0xzK/6AAG2sYx4k Jan 23 08:04:34 np0005593102 certmonger[41137]: mU7Pv3r48XCEnB41ht1fLveH78M1bdTFAHGOwQ9WFuMtkP7iqnbSoHz9h+9TJs/o Jan 23 08:04:34 np0005593102 certmonger[41137]: wYGsZa5fO9agRoHyO5On/tQKvjyOnNktpnXBqbhROUCIVMu5uqHEhtvmdO+W2S/i Jan 23 08:04:34 np0005593102 certmonger[41137]: G/PKd79mZRKeIC7bXBG9wAdyMOdFgDvf+ruCHW03AGxb7Xvdgk+1Oawg8Xw/UAln Jan 23 08:04:34 np0005593102 certmonger[41137]: p/hBJ2QfAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:34 np0005593102 certmonger[41137]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:34 np0005593102 certmonger[41137]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:34 np0005593102 certmonger[41137]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:34 np0005593102 certmonger[41137]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:34 np0005593102 certmonger[41137]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRb Jan 23 08:04:34 np0005593102 certmonger[41137]: gnuUKBYdqkYwgxaYibzdLCmrOjCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDIu Jan 23 08:04:34 np0005593102 certmonger[41137]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Jan 23 08:04:34 np0005593102 certmonger[41137]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAyLmludGVy Jan 23 08:04:34 np0005593102 certmonger[41137]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Jan 23 08:04:34 np0005593102 certmonger[41137]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxh Jan 23 08:04:34 np0005593102 certmonger[41137]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAJtDVLoKGLcLsBKZa1JcLhvf Jan 23 08:04:34 np0005593102 certmonger[41137]: 1g6Pm+YSGffjvawsznfO6BsRXKmAAxkRVcdNfyVJamprtvhMzHQTZEW8QEn6k3Jv Jan 23 08:04:34 np0005593102 certmonger[41137]: emD9HFannE8WQPng3IIUvlyqPYrr3yml/XbkvC3gDAvBRahTDy0CXWz2/kL6L6a6 Jan 23 08:04:34 np0005593102 certmonger[41137]: v5JHS3fm7bEK0GvjGUJp3musmCZPrsd/oHO6Pd1UMQV7DHIxOav8YPqxa3YS9aJs Jan 23 08:04:34 np0005593102 certmonger[41137]: wHLrg9NYKZtw2YDPHtqV3n+iCxTZNwDqeB5NpDKOAc7YstxWoE1syJW0IDEvop15 Jan 23 08:04:34 np0005593102 certmonger[41137]: Bif+l8yEKyAdlKHC0SYmpvbiNDkkUTEF49BbXqFJJcY0O3vQao6uk1Ku/TPpxkGF Jan 23 08:04:34 np0005593102 certmonger[41137]: EtrFpITEk2kL78BR6MQC9x73jadMpQD4lN+YL7DOUPD5fSh9nY2xMqeACXIV7gTJ Jan 23 08:04:34 np0005593102 certmonger[41137]: UhSir+06ZL/KYzzvGZNrXN7UHphbXVPlQCUJux3DlyQ2EynT9MxypBLfjEc1Q5Yn Jan 23 08:04:34 np0005593102 certmonger[41137]: M8W/4uj9PVi3/SPTkxYgjUx6OupwBF9O7OePuavTkg== Jan 23 08:04:34 np0005593102 certmonger[41137]: -----END CERTIFICATE----- Jan 23 08:04:34 np0005593102 certmonger[41137]: ". Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Certificate submission still ongoing. Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Certificate submission postprocessing complete. Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Child status = 0. Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Child output: Jan 23 08:04:34 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nM8W/4uj9PVi3/SPTkxYgjUx6OupwBF9O7OePuavTkg==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:34 np0005593102 certmonger[38898]: " Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:34 np0005593102 certmonger[38898]: MIIFizCCA/OgAwIBAgIRAObBiqwvDlLwilpgZLgTGIAwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:34 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:34 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0MzRaFw0yODAxMjQwODA0MzRaMD8xETAPBgNVBAoM Jan 23 08:04:34 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:04:34 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1vvbnbzH8k8aU Jan 23 08:04:34 np0005593102 certmonger[38898]: JwvR/yHhbiUGR3iG7hI0jmgaPLPSOTRixW/hD/p37BUU9ULnFRRp2r2fQ9cYm6kq Jan 23 08:04:34 np0005593102 certmonger[38898]: bwCT0bP7oCnwCHs6oGc10h7m9ubc8BNdKCLQfAGq0BDwwRC6E0xzK/6AAG2sYx4k Jan 23 08:04:34 np0005593102 certmonger[38898]: mU7Pv3r48XCEnB41ht1fLveH78M1bdTFAHGOwQ9WFuMtkP7iqnbSoHz9h+9TJs/o Jan 23 08:04:34 np0005593102 certmonger[38898]: wYGsZa5fO9agRoHyO5On/tQKvjyOnNktpnXBqbhROUCIVMu5uqHEhtvmdO+W2S/i Jan 23 08:04:34 np0005593102 certmonger[38898]: G/PKd79mZRKeIC7bXBG9wAdyMOdFgDvf+ruCHW03AGxb7Xvdgk+1Oawg8Xw/UAln Jan 23 08:04:34 np0005593102 certmonger[38898]: p/hBJ2QfAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:34 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:34 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:34 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:34 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:34 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRb Jan 23 08:04:34 np0005593102 certmonger[38898]: gnuUKBYdqkYwgxaYibzdLCmrOjCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDIu Jan 23 08:04:34 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Jan 23 08:04:34 np0005593102 certmonger[38898]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAyLmludGVy Jan 23 08:04:34 np0005593102 certmonger[38898]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Jan 23 08:04:34 np0005593102 certmonger[38898]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxh Jan 23 08:04:34 np0005593102 certmonger[38898]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAJtDVLoKGLcLsBKZa1JcLhvf Jan 23 08:04:34 np0005593102 certmonger[38898]: 1g6Pm+YSGffjvawsznfO6BsRXKmAAxkRVcdNfyVJamprtvhMzHQTZEW8QEn6k3Jv Jan 23 08:04:34 np0005593102 certmonger[38898]: emD9HFannE8WQPng3IIUvlyqPYrr3yml/XbkvC3gDAvBRahTDy0CXWz2/kL6L6a6 Jan 23 08:04:34 np0005593102 certmonger[38898]: v5JHS3fm7bEK0GvjGUJp3musmCZPrsd/oHO6Pd1UMQV7DHIxOav8YPqxa3YS9aJs Jan 23 08:04:34 np0005593102 certmonger[38898]: wHLrg9NYKZtw2YDPHtqV3n+iCxTZNwDqeB5NpDKOAc7YstxWoE1syJW0IDEvop15 Jan 23 08:04:34 np0005593102 certmonger[38898]: Bif+l8yEKyAdlKHC0SYmpvbiNDkkUTEF49BbXqFJJcY0O3vQao6uk1Ku/TPpxkGF Jan 23 08:04:34 np0005593102 certmonger[38898]: EtrFpITEk2kL78BR6MQC9x73jadMpQD4lN+YL7DOUPD5fSh9nY2xMqeACXIV7gTJ Jan 23 08:04:34 np0005593102 certmonger[38898]: UhSir+06ZL/KYzzvGZNrXN7UHphbXVPlQCUJux3DlyQ2EynT9MxypBLfjEc1Q5Yn Jan 23 08:04:34 np0005593102 certmonger[38898]: M8W/4uj9PVi3/SPTkxYgjUx6OupwBF9O7OePuavTkg== Jan 23 08:04:34 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:34 np0005593102 certmonger[38898]: ". Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] No hooks set for pre-save command. Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 certmonger[38898]: 2026-01-23 08:04:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:34 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:34 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:35 np0005593102 certmonger[38898]: 2026-01-23 08:04:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:35 np0005593102 certmonger[38898]: 2026-01-23 08:04:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:35 np0005593102 certmonger[41204]: Certificate in file "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" issued by CA and saved. Jan 23 08:04:35 np0005593102 certmonger[38898]: 2026-01-23 08:04:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080433 Jan 23 08:04:35 np0005593102 python3[41220]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q lvm2 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:04:35 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:36 np0005593102 python3[41237]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:04:44 np0005593102 podman[41238]: 2026-01-23 08:04:36.77558139 +0000 UTC m=+0.028769111 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Jan 23 08:04:44 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:45 np0005593102 python3[41316]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 cluster.common.tag/manila-share:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:04:45 np0005593102 podman[41317]: 2026-01-23 08:04:45.132203529 +0000 UTC m=+0.043368085 image tag b9682dee21d7c5836da0f5094cc87a67e8c855fb08692e50824e31ad6f3d7b7f cluster.common.tag/manila-share:pcmklatest Jan 23 08:04:45 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:45 np0005593102 python3[41343]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:04:46 np0005593102 python3[41363]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:49 np0005593102 python3[41380]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:52 np0005593102 python3[41397]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:53 np0005593102 python3[41413]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:53 np0005593102 python3[41429]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:04:54 np0005593102 python3[41447]: ansible-certificate_request Invoked with name=memcached dns=['np0005593102.internalapi.ooo.test'] principal=['memcached/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep memcached)#012service_crt="/etc/pki/tls/certs/memcached.crt"#012service_key="/etc/pki/tls/private/memcached.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec -u root "$container_name" chown memcached:memcached "$service_crt"#012podman exec -u root "$container_name" chown memcached:memcached "$service_key"#012# Send refresh_certs command to memcached to read the new certificate#012memcached_ip="$(hiera -c /etc/puppet/hiera.yaml memcached::listen_ip.0 127.0.0.1)"#012memcached_port="$(hiera -c /etc/puppet/hiera.yaml memcached::tcp_port 11211)"#012echo refresh_certs | openssl s_client -connect $memcached_ip:$memcached_port#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:04:54 np0005593102 certmonger[41457]: " for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_REQ_PRINCIPAL" to "memcached/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:04:54 np0005593102 certmonger[41457]: " for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:54 np0005593102 certmonger[41457]: MIID3DCCAsQCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:04:54 np0005593102 certmonger[41457]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvFNZzk4R Jan 23 08:04:54 np0005593102 certmonger[41457]: 5Jia43Yc31xzUPvfz1ofWwmG2slODGEZxmeq0ftCP0mKrFKgIdI+L4qeVztQOsIM Jan 23 08:04:54 np0005593102 certmonger[41457]: rZzLk1c9lPjdvy3t2kEfUdAosHibATF+jjoqV5Y67U8Q9Lr4t1OfiujbjgZP9iex Jan 23 08:04:54 np0005593102 certmonger[41457]: 0O6BbO4neI5m/BlKUOHE7BetMFptYyCIGQMqyj0eRXEr9tNSD6J4Bkm7z9ozzOYN Jan 23 08:04:54 np0005593102 certmonger[41457]: t9+GWTs9ByRKAhQ1Lm/iTuDsa400ubR1tpukzx66SsoXZAamf8EYYcwRkxOO6yut Jan 23 08:04:54 np0005593102 certmonger[41457]: 44s2mhss2stSHMAGsGZn+GNIIS6/9p7YB7BAV+q4BXNUiKSVlvj+kAI0vzEShwz2 Jan 23 08:04:54 np0005593102 certmonger[41457]: fLT7DZZ9ndMjnQIDAQABoIIBaTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:04:54 np0005593102 certmonger[41457]: ADIAMwAwADgAMAA0ADUANDCCATgGCSqGSIb3DQEJDjGCASkwggElMAsGA1UdDwQE Jan 23 08:04:54 np0005593102 certmonger[41457]: AwIFoDCByQYDVR0RBIHBMIG+giFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:04:54 np0005593102 certmonger[41457]: LnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQvbnAwMDA1NTkzMTAyLmlu Jan 23 08:04:54 np0005593102 certmonger[41457]: dGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisGAQUCAqBJMEegChsIT09P Jan 23 08:04:54 np0005593102 certmonger[41457]: LlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5wMDAwNTU5MzEwMi5pbnRl Jan 23 08:04:54 np0005593102 certmonger[41457]: cm5hbGFwaS5vb28udGVzdDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Jan 23 08:04:54 np0005593102 certmonger[41457]: DAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUj1pjlVqbggnMsXNZOl7W9eE8VyMwDQYJ Jan 23 08:04:54 np0005593102 certmonger[41457]: KoZIhvcNAQELBQADggEBAHRmSIxYaYPFNuGuAd9YLCvc3EEperf2gC/HufxgtKRF Jan 23 08:04:54 np0005593102 certmonger[41457]: hxoA0Ir+xM9UK/ogprIwIwVBd2p4MbWdZFOm71fm9x7871J7Y3lCzC9TzIkHLAs9 Jan 23 08:04:54 np0005593102 certmonger[41457]: SxghDTbuGWX1GVqPKhuKZ83QH8GL1niCyiR/SI9nEMNGspnetg7FVqCBqjo0VAdB Jan 23 08:04:54 np0005593102 certmonger[41457]: Ys4c47rTzYGTG9Ea3wDmurGdMK1xJbnoBaRGwdR5TdkZ1wJoaQFEH/TdaudpgiiR Jan 23 08:04:54 np0005593102 certmonger[41457]: AzIiT9F+QcdaoyMVtPY/uZF/VqCjD3//NjH/YNW7nVUegG1o84VAi4Fm3MWQ1J6v Jan 23 08:04:54 np0005593102 certmonger[41457]: MfBBafyqnHMeBBEHN0uRzyudHm73XKhhipYJalPwnrI= Jan 23 08:04:54 np0005593102 certmonger[41457]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:54 np0005593102 certmonger[41457]: " for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8U1nOThHkmJrjdhzfXHNQ+9/PWh9bCYbayU4MYRnGZ6rR+0I/SYqsUqAh0j4vip5XO1A6wgytnMuTVz2U+N2/Le3aQR9R0CiweJsBMX6OOipXljrtTxD0uvi3U5+K6NuOBk/2J7HQ7oFs7id4jmb8GUpQ4cTsF60wWm1jIIgZAyrKPR5FcSv201IPongGSbvP2jPM5g2334ZZOz0HJEoCFDUub+JO4OxrjTS5tHW2m6TPHrpKyhdkBqZ/wRhhzBGTE47rK63jizaaGyzay1IcwAawZmf4Y0ghLr/2ntgHsEBX6rgFc1SIpJWW+P6QAjS/MRKHDPZ8tPsNln2d0yOdAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAhZxjOpyNRGgUAsA32+MugAcnXd9knqRVqK04Na0cjFXvph6w1slK95IRdCuxXrfQ9Dhm3mOsGEkXktGq9k1fX6tvtPMczAWWXfv8hw5IsiYLqgcctgNnWAFFLVxiS/OEXEK5uOwjw99CN0/T/zJB0rIuAb+HO7zR8T/wJMYg/cTStznZaYqx8nc4A5LDT6MhMkarpb4dlu9RpcO0/NCyHqtm7kimZ8uYKwUktaQLHoc519c5CwNmjfPmxgM56wXuENcGapWfda39Dd2lfBevCPRz2MGir/PCPH8TUzBHhfCbcF6/z6MKtxmhqKQoc36QO4J+NmFS3C1hsedDE3gH4g==" for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvFNZzk4R5Jia43Yc31xzUPvfz1ofWwmG2slODGEZxmeq0ftCP0mKrFKgIdI+L4qeVztQOsIMrZzLk1c9lPjdvy3t2kEfUdAosHibATF+jjoqV5Y67U8Q9Lr4t1OfiujbjgZP9iex0O6BbO4neI5m/BlKUOHE7BetMFptYyCIGQMqyj0eRXEr9tNSD6J4Bkm7z9ozzOYNt9+GWTs9ByRKAhQ1Lm/iTuDsa400ubR1tpukzx66SsoXZAamf8EYYcwRkxOO6yut44s2mhss2stSHMAGsGZn+GNIIS6/9p7YB7BAV+q4BXNUiKSVlvj+kAI0vzEShwz2fLT7DZZ9ndMjnQIDAQAB" for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:54 np0005593102 certmonger[41457]: 2026-01-23 08:04:54 [41457] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:54 np0005593102 certmonger[38898]: 2026-01-23 08:04:54 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593102 certmonger[41457]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:55 np0005593102 certmonger[41457]: Certificate: "MIIFbzCCA9egAwIBAgIRAM5viwkp2AKcyj5Zyq/jEvEwDQYJKoZIhvcNAQELBQAwMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0yNjAxMjMwODA0NTVaFw0yODAxMjQwODA0NTVaMD8xETAPBgNVBAoMCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8U1nOThHkmJrjdhzfXHNQ+9/PWh9bCYbayU4MYRnGZ6rR+0I/SYqsUqAh0j4vip5XO1A6wgytnMuTVz2U+N2/Le3aQR9R0CiweJsBMX6OOipXljrtTxD0uvi3U5+K6NuOBk/2J7HQ7oFs7id4jmb8GUpQ4cTsF60wWm1jIIgZAyrKPR5FcSv201IPongGSbvP2jPM5g2334ZZOz0HJEoCFDUub+JO4OxrjTS5tHW2m6TPHrpKyhdkBqZ/wRhhzBGTE47rK63jizaaGyzay1IcwAawZmf4Y0ghLr/2ntgHsEBX6rgFc1SIpJWW+P6QAjS/MRKHDPZ8tPsNln2d0yOdAgMBAAGjggHwMIIB7DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTLemi+EoKN9tbDt6Z8hJwi8ODPDDCByQYDVR0RBIHBMIG+giFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQvbnAwMDA1NTkzMTAyLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisGAQUCAqBJMEegChsIT09PLlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAT05yrSRG5UjO33vNFkVu7SRar+bj+4IPIt0YtQ3tuIjGRvY8lYQA5oBJKoekwddTyWi2Mc1fr9FtRW1nU3XZDGCJQ1Hrx/NRknxnzJHkHaZmnYbr1Y+tVgUrZh95x4Jlj4gOAZKVzultr1XI9TV6Mn+aO425UDK2Li32OohglmR0Q0LsGEH/RSAjCP4p+0VOZA+v4FTnbamuwxd+64Kg9K9nHbh54Bja8B5GVDsOJsBsRQ4gKCpn7DHQOwQLdBNyoGbxnHCllKiXM81YojubtHNG+gkV4RWrSZx/+uopxdxdfheqPNXbitawcpUhoMI1AF+0I1tgwenp11e07nJlSc3q1hrP5noddWP94tvDc4RHNj6Wp7iXdA49J1pYVlHlWu6OoNkGrtd3OPvWG1YqyjEBLCNmIk4KbqUbzgjFLRlkW8CKKXI1SA6nXW0srWUrE0sh93wpV49BfyzuYX+VIFtjm4VBPTzwi2J62VL+s+fT5SMFlbCNnB5bKy14x9/t" Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Certificate submission still ongoing. Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Certificate submission attempt complete. Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Child status = 0. Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Child output: Jan 23 08:04:55 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:55 np0005593102 certmonger[38898]: MIIFbzCCA9egAwIBAgIRAM5viwkp2AKcyj5Zyq/jEvEwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:55 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:55 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0NTVaFw0yODAxMjQwODA0NTVaMD8xETAPBgNVBAoM Jan 23 08:04:55 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:04:55 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8U1nOThHkmJrj Jan 23 08:04:55 np0005593102 certmonger[38898]: dhzfXHNQ+9/PWh9bCYbayU4MYRnGZ6rR+0I/SYqsUqAh0j4vip5XO1A6wgytnMuT Jan 23 08:04:55 np0005593102 certmonger[38898]: Vz2U+N2/Le3aQR9R0CiweJsBMX6OOipXljrtTxD0uvi3U5+K6NuOBk/2J7HQ7oFs Jan 23 08:04:55 np0005593102 certmonger[38898]: 7id4jmb8GUpQ4cTsF60wWm1jIIgZAyrKPR5FcSv201IPongGSbvP2jPM5g2334ZZ Jan 23 08:04:55 np0005593102 certmonger[38898]: Oz0HJEoCFDUub+JO4OxrjTS5tHW2m6TPHrpKyhdkBqZ/wRhhzBGTE47rK63jizaa Jan 23 08:04:55 np0005593102 certmonger[38898]: Gyzay1IcwAawZmf4Y0ghLr/2ntgHsEBX6rgFc1SIpJWW+P6QAjS/MRKHDPZ8tPsN Jan 23 08:04:55 np0005593102 certmonger[38898]: ln2d0yOdAgMBAAGjggHwMIIB7DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:55 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:55 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:55 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:55 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:55 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTL Jan 23 08:04:55 np0005593102 certmonger[38898]: emi+EoKN9tbDt6Z8hJwi8ODPDDCByQYDVR0RBIHBMIG+giFucDAwMDU1OTMxMDIu Jan 23 08:04:55 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQv Jan 23 08:04:55 np0005593102 certmonger[38898]: bnAwMDA1NTkzMTAyLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisG Jan 23 08:04:55 np0005593102 certmonger[38898]: AQUCAqBJMEegChsIT09PLlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5w Jan 23 08:04:55 np0005593102 certmonger[38898]: MDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOC Jan 23 08:04:55 np0005593102 certmonger[38898]: AYEAT05yrSRG5UjO33vNFkVu7SRar+bj+4IPIt0YtQ3tuIjGRvY8lYQA5oBJKoek Jan 23 08:04:55 np0005593102 certmonger[38898]: wddTyWi2Mc1fr9FtRW1nU3XZDGCJQ1Hrx/NRknxnzJHkHaZmnYbr1Y+tVgUrZh95 Jan 23 08:04:55 np0005593102 certmonger[38898]: x4Jlj4gOAZKVzultr1XI9TV6Mn+aO425UDK2Li32OohglmR0Q0LsGEH/RSAjCP4p Jan 23 08:04:55 np0005593102 certmonger[38898]: +0VOZA+v4FTnbamuwxd+64Kg9K9nHbh54Bja8B5GVDsOJsBsRQ4gKCpn7DHQOwQL Jan 23 08:04:55 np0005593102 certmonger[38898]: dBNyoGbxnHCllKiXM81YojubtHNG+gkV4RWrSZx/+uopxdxdfheqPNXbitawcpUh Jan 23 08:04:55 np0005593102 certmonger[38898]: oMI1AF+0I1tgwenp11e07nJlSc3q1hrP5noddWP94tvDc4RHNj6Wp7iXdA49J1pY Jan 23 08:04:55 np0005593102 certmonger[38898]: VlHlWu6OoNkGrtd3OPvWG1YqyjEBLCNmIk4KbqUbzgjFLRlkW8CKKXI1SA6nXW0s Jan 23 08:04:55 np0005593102 certmonger[38898]: rWUrE0sh93wpV49BfyzuYX+VIFtjm4VBPTzwi2J62VL+s+fT5SMFlbCNnB5bKy14 Jan 23 08:04:55 np0005593102 certmonger[38898]: x9/t Jan 23 08:04:55 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:55 np0005593102 certmonger[38898]: " Jan 23 08:04:55 np0005593102 certmonger[41459]: 2026-01-23 08:04:55 [41459] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:55 np0005593102 certmonger[41459]: MIIFbzCCA9egAwIBAgIRAM5viwkp2AKcyj5Zyq/jEvEwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:55 np0005593102 certmonger[41459]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:55 np0005593102 certmonger[41459]: cml0eTAeFw0yNjAxMjMwODA0NTVaFw0yODAxMjQwODA0NTVaMD8xETAPBgNVBAoM Jan 23 08:04:55 np0005593102 certmonger[41459]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:04:55 np0005593102 certmonger[41459]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8U1nOThHkmJrj Jan 23 08:04:55 np0005593102 certmonger[41459]: dhzfXHNQ+9/PWh9bCYbayU4MYRnGZ6rR+0I/SYqsUqAh0j4vip5XO1A6wgytnMuT Jan 23 08:04:55 np0005593102 certmonger[41459]: Vz2U+N2/Le3aQR9R0CiweJsBMX6OOipXljrtTxD0uvi3U5+K6NuOBk/2J7HQ7oFs Jan 23 08:04:55 np0005593102 certmonger[41459]: 7id4jmb8GUpQ4cTsF60wWm1jIIgZAyrKPR5FcSv201IPongGSbvP2jPM5g2334ZZ Jan 23 08:04:55 np0005593102 certmonger[41459]: Oz0HJEoCFDUub+JO4OxrjTS5tHW2m6TPHrpKyhdkBqZ/wRhhzBGTE47rK63jizaa Jan 23 08:04:55 np0005593102 certmonger[41459]: Gyzay1IcwAawZmf4Y0ghLr/2ntgHsEBX6rgFc1SIpJWW+P6QAjS/MRKHDPZ8tPsN Jan 23 08:04:55 np0005593102 certmonger[41459]: ln2d0yOdAgMBAAGjggHwMIIB7DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:55 np0005593102 certmonger[41459]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:55 np0005593102 certmonger[41459]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:55 np0005593102 certmonger[41459]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:55 np0005593102 certmonger[41459]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:55 np0005593102 certmonger[41459]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTL Jan 23 08:04:55 np0005593102 certmonger[41459]: emi+EoKN9tbDt6Z8hJwi8ODPDDCByQYDVR0RBIHBMIG+giFucDAwMDU1OTMxMDIu Jan 23 08:04:55 np0005593102 certmonger[41459]: aW50ZXJuYWxhcGkub29vLnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQv Jan 23 08:04:55 np0005593102 certmonger[41459]: bnAwMDA1NTkzMTAyLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisG Jan 23 08:04:55 np0005593102 certmonger[41459]: AQUCAqBJMEegChsIT09PLlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5w Jan 23 08:04:55 np0005593102 certmonger[41459]: MDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOC Jan 23 08:04:55 np0005593102 certmonger[41459]: AYEAT05yrSRG5UjO33vNFkVu7SRar+bj+4IPIt0YtQ3tuIjGRvY8lYQA5oBJKoek Jan 23 08:04:55 np0005593102 certmonger[41459]: wddTyWi2Mc1fr9FtRW1nU3XZDGCJQ1Hrx/NRknxnzJHkHaZmnYbr1Y+tVgUrZh95 Jan 23 08:04:55 np0005593102 certmonger[41459]: x4Jlj4gOAZKVzultr1XI9TV6Mn+aO425UDK2Li32OohglmR0Q0LsGEH/RSAjCP4p Jan 23 08:04:55 np0005593102 certmonger[41459]: +0VOZA+v4FTnbamuwxd+64Kg9K9nHbh54Bja8B5GVDsOJsBsRQ4gKCpn7DHQOwQL Jan 23 08:04:55 np0005593102 certmonger[41459]: dBNyoGbxnHCllKiXM81YojubtHNG+gkV4RWrSZx/+uopxdxdfheqPNXbitawcpUh Jan 23 08:04:55 np0005593102 certmonger[41459]: oMI1AF+0I1tgwenp11e07nJlSc3q1hrP5noddWP94tvDc4RHNj6Wp7iXdA49J1pY Jan 23 08:04:55 np0005593102 certmonger[41459]: VlHlWu6OoNkGrtd3OPvWG1YqyjEBLCNmIk4KbqUbzgjFLRlkW8CKKXI1SA6nXW0s Jan 23 08:04:55 np0005593102 certmonger[41459]: rWUrE0sh93wpV49BfyzuYX+VIFtjm4VBPTzwi2J62VL+s+fT5SMFlbCNnB5bKy14 Jan 23 08:04:55 np0005593102 certmonger[41459]: x9/t Jan 23 08:04:55 np0005593102 certmonger[41459]: -----END CERTIFICATE----- Jan 23 08:04:55 np0005593102 certmonger[41459]: ". Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Certificate submission still ongoing. Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Certificate submission postprocessing complete. Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Child status = 0. Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Child output: Jan 23 08:04:55 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nx9/t\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:55 np0005593102 certmonger[38898]: " Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:55 np0005593102 certmonger[38898]: MIIFbzCCA9egAwIBAgIRAM5viwkp2AKcyj5Zyq/jEvEwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:55 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:55 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA0NTVaFw0yODAxMjQwODA0NTVaMD8xETAPBgNVBAoM Jan 23 08:04:55 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:04:55 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8U1nOThHkmJrj Jan 23 08:04:55 np0005593102 certmonger[38898]: dhzfXHNQ+9/PWh9bCYbayU4MYRnGZ6rR+0I/SYqsUqAh0j4vip5XO1A6wgytnMuT Jan 23 08:04:55 np0005593102 certmonger[38898]: Vz2U+N2/Le3aQR9R0CiweJsBMX6OOipXljrtTxD0uvi3U5+K6NuOBk/2J7HQ7oFs Jan 23 08:04:55 np0005593102 certmonger[38898]: 7id4jmb8GUpQ4cTsF60wWm1jIIgZAyrKPR5FcSv201IPongGSbvP2jPM5g2334ZZ Jan 23 08:04:55 np0005593102 certmonger[38898]: Oz0HJEoCFDUub+JO4OxrjTS5tHW2m6TPHrpKyhdkBqZ/wRhhzBGTE47rK63jizaa Jan 23 08:04:55 np0005593102 certmonger[38898]: Gyzay1IcwAawZmf4Y0ghLr/2ntgHsEBX6rgFc1SIpJWW+P6QAjS/MRKHDPZ8tPsN Jan 23 08:04:55 np0005593102 certmonger[38898]: ln2d0yOdAgMBAAGjggHwMIIB7DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:55 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:55 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:55 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:55 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:55 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTL Jan 23 08:04:55 np0005593102 certmonger[38898]: emi+EoKN9tbDt6Z8hJwi8ODPDDCByQYDVR0RBIHBMIG+giFucDAwMDU1OTMxMDIu Jan 23 08:04:55 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQv Jan 23 08:04:55 np0005593102 certmonger[38898]: bnAwMDA1NTkzMTAyLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisG Jan 23 08:04:55 np0005593102 certmonger[38898]: AQUCAqBJMEegChsIT09PLlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5w Jan 23 08:04:55 np0005593102 certmonger[38898]: MDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOC Jan 23 08:04:55 np0005593102 certmonger[38898]: AYEAT05yrSRG5UjO33vNFkVu7SRar+bj+4IPIt0YtQ3tuIjGRvY8lYQA5oBJKoek Jan 23 08:04:55 np0005593102 certmonger[38898]: wddTyWi2Mc1fr9FtRW1nU3XZDGCJQ1Hrx/NRknxnzJHkHaZmnYbr1Y+tVgUrZh95 Jan 23 08:04:55 np0005593102 certmonger[38898]: x4Jlj4gOAZKVzultr1XI9TV6Mn+aO425UDK2Li32OohglmR0Q0LsGEH/RSAjCP4p Jan 23 08:04:55 np0005593102 certmonger[38898]: +0VOZA+v4FTnbamuwxd+64Kg9K9nHbh54Bja8B5GVDsOJsBsRQ4gKCpn7DHQOwQL Jan 23 08:04:55 np0005593102 certmonger[38898]: dBNyoGbxnHCllKiXM81YojubtHNG+gkV4RWrSZx/+uopxdxdfheqPNXbitawcpUh Jan 23 08:04:55 np0005593102 certmonger[38898]: oMI1AF+0I1tgwenp11e07nJlSc3q1hrP5noddWP94tvDc4RHNj6Wp7iXdA49J1pY Jan 23 08:04:55 np0005593102 certmonger[38898]: VlHlWu6OoNkGrtd3OPvWG1YqyjEBLCNmIk4KbqUbzgjFLRlkW8CKKXI1SA6nXW0s Jan 23 08:04:55 np0005593102 certmonger[38898]: rWUrE0sh93wpV49BfyzuYX+VIFtjm4VBPTzwi2J62VL+s+fT5SMFlbCNnB5bKy14 Jan 23 08:04:55 np0005593102 certmonger[38898]: x9/t Jan 23 08:04:55 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:04:55 np0005593102 certmonger[38898]: ". Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] No hooks set for pre-save command. Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:55 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593102 certmonger[41527]: Certificate in file "/etc/pki/tls/certs/memcached.crt" issued by CA and saved. Jan 23 08:04:55 np0005593102 certmonger[38898]: 2026-01-23 08:04:55 [38898] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:56 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:56 np0005593102 python3[41543]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:04:57 np0005593102 python3[41563]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:00 np0005593102 python3[41580]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:03 np0005593102 python3[41597]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:04 np0005593102 python3[41613]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:04 np0005593102 python3[41629]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:05 np0005593102 python3[41647]: ansible-certificate_request Invoked with name=metrics_qdr dns=['np0005593102.internalapi.ooo.test'] principal=['metrics_qdr/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep metrics_qdr)#012service_crt="/etc/pki/tls/certs/metrics_qdr.crt"#012service_key="/etc/pki/tls/private/metrics_qdr.key#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_crt"#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_key"#012# Trigger a container restart to read the new certificate#012podman restart "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:05:05 np0005593102 certmonger[41657]: " for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_REQ_PRINCIPAL" to "metrics_qdr/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:05:05 np0005593102 certmonger[41657]: " for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:05 np0005593102 certmonger[41657]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:05:05 np0005593102 certmonger[41657]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsyIVSoZP Jan 23 08:05:05 np0005593102 certmonger[41657]: Vs3z9GRgkPBh77z4RJCtdMNprHrNegBeLf6CiLc16KkGnl/KHHtlmbkH5pPj3+lA Jan 23 08:05:05 np0005593102 certmonger[41657]: kf8hU2haK4J524gZywzKPFPledy93ntG5dGk5vtxFEm7grURBg8IIoIuV9POoGOr Jan 23 08:05:05 np0005593102 certmonger[41657]: KuAf34cHyDP8TR+t2WZCmevye4h7nj9qOhhnRI6Du0MIFs+vMRGJ+mPIgmPWo1vg Jan 23 08:05:05 np0005593102 certmonger[41657]: e0O+1JMGX6OqOSbOYlz5EBVd/v0/XzK5D2QK9hSLcyAwh8+yFPCgdCezxBLgDkm8 Jan 23 08:05:05 np0005593102 certmonger[41657]: RWObeoYrgkt85RVOlckkC5VGIY2RUN4sAFMPK6p/cKqYD/3j2G+AdkIa20eP9xNZ Jan 23 08:05:05 np0005593102 certmonger[41657]: tX68R2Tqyi1wJQIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:05 np0005593102 certmonger[41657]: ADIAMwAwADgAMAA1ADAANTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Jan 23 08:05:05 np0005593102 certmonger[41657]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:05 np0005593102 certmonger[41657]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fkci9ucDAwMDU1OTMxMDIu Jan 23 08:05:05 np0005593102 certmonger[41657]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Jan 23 08:05:05 np0005593102 certmonger[41657]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRyGyFucDAwMDU1OTMxMDIu Jan 23 08:05:05 np0005593102 certmonger[41657]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Jan 23 08:05:05 np0005593102 certmonger[41657]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFPTHAZVaTkV6nUeDLjWzZAQqpphN Jan 23 08:05:05 np0005593102 certmonger[41657]: MA0GCSqGSIb3DQEBCwUAA4IBAQBuCqUKFU//Kgw//hbibgz6mnSeRTtuJ1Lzi251 Jan 23 08:05:05 np0005593102 certmonger[41657]: PjMllduczPpeQokoaWRarCiMtrhxcpqaOte6EFNQbJas17J8z799pbCdrJptcLrr Jan 23 08:05:05 np0005593102 certmonger[41657]: Tf//A9wVTuW5KMSO298hNu5uTA6pPC5kM+16WUO3yq/jsexlMCwIlxOtGvw1BsKs Jan 23 08:05:05 np0005593102 certmonger[41657]: Kv4G9l8CPLyKmtWYL/ZQav6Rnn+aKBK8Pj3ljwfGSVQSHcY8MMQmLkVuFT/xMj8T Jan 23 08:05:05 np0005593102 certmonger[41657]: UAC4m5B4IUauEiSZsyJl00HkVaZqdI/Eozc8aV2XzxB+cAoIipkKFfZCMSK/9HWD Jan 23 08:05:05 np0005593102 certmonger[41657]: GgX2nGxhQh8I6PJUx4n+1s8XXD3kzGvlVbtiT2XwbMtHs0h4 Jan 23 08:05:05 np0005593102 certmonger[41657]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:05 np0005593102 certmonger[41657]: " for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsyIVSoZPVs3z9GRgkPBh77z4RJCtdMNprHrNegBeLf6CiLc16KkGnl/KHHtlmbkH5pPj3+lAkf8hU2haK4J524gZywzKPFPledy93ntG5dGk5vtxFEm7grURBg8IIoIuV9POoGOrKuAf34cHyDP8TR+t2WZCmevye4h7nj9qOhhnRI6Du0MIFs+vMRGJ+mPIgmPWo1vge0O+1JMGX6OqOSbOYlz5EBVd/v0/XzK5D2QK9hSLcyAwh8+yFPCgdCezxBLgDkm8RWObeoYrgkt85RVOlckkC5VGIY2RUN4sAFMPK6p/cKqYD/3j2G+AdkIa20eP9xNZtX68R2Tqyi1wJQIDAQAB" for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:05 np0005593102 certmonger[41657]: 2026-01-23 08:05:05 [41657] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[41657]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:05 np0005593102 certmonger[41657]: Certificate: "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" Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Certificate submission still ongoing. Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Certificate submission attempt complete. Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Child status = 0. Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Child output: Jan 23 08:05:05 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:05 np0005593102 certmonger[38898]: MIIFczCCA9ugAwIBAgIRAO7acHQGHw4EaRgJ3MVBfJAwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:05 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:05 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA1MDVaFw0yODAxMjQwODA1MDVaMD8xETAPBgNVBAoM Jan 23 08:05:05 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:05 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzIhVKhk9WzfP0 Jan 23 08:05:05 np0005593102 certmonger[38898]: ZGCQ8GHvvPhEkK10w2mses16AF4t/oKItzXoqQaeX8oce2WZuQfmk+Pf6UCR/yFT Jan 23 08:05:05 np0005593102 certmonger[38898]: aForgnnbiBnLDMo8U+V53L3ee0bl0aTm+3EUSbuCtREGDwgigi5X086gY6sq4B/f Jan 23 08:05:05 np0005593102 certmonger[38898]: hwfIM/xNH63ZZkKZ6/J7iHueP2o6GGdEjoO7QwgWz68xEYn6Y8iCY9ajW+B7Q77U Jan 23 08:05:05 np0005593102 certmonger[38898]: kwZfo6o5Js5iXPkQFV3+/T9fMrkPZAr2FItzIDCHz7IU8KB0J7PEEuAOSbxFY5t6 Jan 23 08:05:05 np0005593102 certmonger[38898]: hiuCS3zlFU6VySQLlUYhjZFQ3iwAUw8rqn9wqpgP/ePYb4B2QhrbR4/3E1m1frxH Jan 23 08:05:05 np0005593102 certmonger[38898]: ZOrKLXAlAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:05 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:05 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:05 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQv Jan 23 08:05:05 np0005593102 certmonger[38898]: 963sWIA/Kp4wxgjsGQ81lAEOujCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIu Jan 23 08:05:05 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk Jan 23 08:05:05 np0005593102 certmonger[38898]: ci9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:05 np0005593102 certmonger[38898]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy Jan 23 08:05:05 np0005593102 certmonger[38898]: GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:05 np0005593102 certmonger[38898]: BQADggGBADcTbXULe8/ove0xz8APci+XjGxAZHHPGW5Kmk/5BDZiVSMUpZSL7KPn Jan 23 08:05:05 np0005593102 certmonger[38898]: uP5FJrZMOgm6DQR3H6mXh9xLk/GEPXukreMGToC/jFz+gSyFo+YaGejb9fQOMSSw Jan 23 08:05:05 np0005593102 certmonger[38898]: JFGJqLEibcdAn8ad+vGBLrLrgQupQjA3WhwyzkBh0nFVC21puR2s0Jvb6jiF7B3S Jan 23 08:05:05 np0005593102 certmonger[38898]: /a11j89qwqCfrUzqwfNC6aA4u9EmXeB/JtiBz6/nyvO5apzm5rYE3ivWS7Va6MFy Jan 23 08:05:05 np0005593102 certmonger[38898]: OAGcFG3V46GHHNltSfJ/qzh7lsB8sNkLCN0PTZxnLH/+QO+UTMjE5mSl3VYYKkIk Jan 23 08:05:05 np0005593102 certmonger[38898]: Fsy+xH8RE+8R/YTgXVTsNeepo2rO1Cg9ylolNXbONjG7wHWc+TJQO0MP0X5JpSUx Jan 23 08:05:05 np0005593102 certmonger[38898]: Ltp7STH/ihvVHBx/yfzT/HtjQApT251mIeIVb2fKLSCkza+ftU4oiiSKlmYX2/6+ Jan 23 08:05:05 np0005593102 certmonger[38898]: TRWvGVz9aqAfuFs+H9LlOr6202hpGvvTr6IcuBx4TV5GDpn+CoE81qHffFXe6TNx Jan 23 08:05:05 np0005593102 certmonger[38898]: CB40+lpKWg== Jan 23 08:05:05 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:05 np0005593102 certmonger[38898]: " Jan 23 08:05:05 np0005593102 certmonger[41661]: 2026-01-23 08:05:05 [41661] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:05 np0005593102 certmonger[41661]: MIIFczCCA9ugAwIBAgIRAO7acHQGHw4EaRgJ3MVBfJAwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:05 np0005593102 certmonger[41661]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:05 np0005593102 certmonger[41661]: cml0eTAeFw0yNjAxMjMwODA1MDVaFw0yODAxMjQwODA1MDVaMD8xETAPBgNVBAoM Jan 23 08:05:05 np0005593102 certmonger[41661]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:05 np0005593102 certmonger[41661]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzIhVKhk9WzfP0 Jan 23 08:05:05 np0005593102 certmonger[41661]: ZGCQ8GHvvPhEkK10w2mses16AF4t/oKItzXoqQaeX8oce2WZuQfmk+Pf6UCR/yFT Jan 23 08:05:05 np0005593102 certmonger[41661]: aForgnnbiBnLDMo8U+V53L3ee0bl0aTm+3EUSbuCtREGDwgigi5X086gY6sq4B/f Jan 23 08:05:05 np0005593102 certmonger[41661]: hwfIM/xNH63ZZkKZ6/J7iHueP2o6GGdEjoO7QwgWz68xEYn6Y8iCY9ajW+B7Q77U Jan 23 08:05:05 np0005593102 certmonger[41661]: kwZfo6o5Js5iXPkQFV3+/T9fMrkPZAr2FItzIDCHz7IU8KB0J7PEEuAOSbxFY5t6 Jan 23 08:05:05 np0005593102 certmonger[41661]: hiuCS3zlFU6VySQLlUYhjZFQ3iwAUw8rqn9wqpgP/ePYb4B2QhrbR4/3E1m1frxH Jan 23 08:05:05 np0005593102 certmonger[41661]: ZOrKLXAlAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:05 np0005593102 certmonger[41661]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593102 certmonger[41661]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:05 np0005593102 certmonger[41661]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593102 certmonger[41661]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:05 np0005593102 certmonger[41661]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQv Jan 23 08:05:05 np0005593102 certmonger[41661]: 963sWIA/Kp4wxgjsGQ81lAEOujCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIu Jan 23 08:05:05 np0005593102 certmonger[41661]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk Jan 23 08:05:05 np0005593102 certmonger[41661]: ci9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:05 np0005593102 certmonger[41661]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy Jan 23 08:05:05 np0005593102 certmonger[41661]: GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:05 np0005593102 certmonger[41661]: BQADggGBADcTbXULe8/ove0xz8APci+XjGxAZHHPGW5Kmk/5BDZiVSMUpZSL7KPn Jan 23 08:05:05 np0005593102 certmonger[41661]: uP5FJrZMOgm6DQR3H6mXh9xLk/GEPXukreMGToC/jFz+gSyFo+YaGejb9fQOMSSw Jan 23 08:05:05 np0005593102 certmonger[41661]: JFGJqLEibcdAn8ad+vGBLrLrgQupQjA3WhwyzkBh0nFVC21puR2s0Jvb6jiF7B3S Jan 23 08:05:05 np0005593102 certmonger[41661]: /a11j89qwqCfrUzqwfNC6aA4u9EmXeB/JtiBz6/nyvO5apzm5rYE3ivWS7Va6MFy Jan 23 08:05:05 np0005593102 certmonger[41661]: OAGcFG3V46GHHNltSfJ/qzh7lsB8sNkLCN0PTZxnLH/+QO+UTMjE5mSl3VYYKkIk Jan 23 08:05:05 np0005593102 certmonger[41661]: Fsy+xH8RE+8R/YTgXVTsNeepo2rO1Cg9ylolNXbONjG7wHWc+TJQO0MP0X5JpSUx Jan 23 08:05:05 np0005593102 certmonger[41661]: Ltp7STH/ihvVHBx/yfzT/HtjQApT251mIeIVb2fKLSCkza+ftU4oiiSKlmYX2/6+ Jan 23 08:05:05 np0005593102 certmonger[41661]: TRWvGVz9aqAfuFs+H9LlOr6202hpGvvTr6IcuBx4TV5GDpn+CoE81qHffFXe6TNx Jan 23 08:05:05 np0005593102 certmonger[41661]: CB40+lpKWg== Jan 23 08:05:05 np0005593102 certmonger[41661]: -----END CERTIFICATE----- Jan 23 08:05:05 np0005593102 certmonger[41661]: ". Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Certificate submission still ongoing. Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Certificate submission postprocessing complete. Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Child status = 0. Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Child output: Jan 23 08:05:05 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFczCCA9ugAwIBAgIRAO7acHQGHw4EaRgJ3MVBfJAwDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAxMjMwODA1MDVaFw0yODAxMjQwODA1MDVaMD8xETAPBgNVBAoM\nCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v\nLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzIhVKhk9WzfP0\nZGCQ8GHvvPhEkK10w2mses16AF4t/oKItzXoqQaeX8oce2WZuQfmk+Pf6UCR/yFT\naForgnnbiBnLDMo8U+V53L3ee0bl0aTm+3EUSbuCtREGDwgigi5X086gY6sq4B/f\nhwfIM/xNH63ZZkKZ6/J7iHueP2o6GGdEjoO7QwgWz68xEYn6Y8iCY9ajW+B7Q77U\nkwZfo6o5Js5iXPkQFV3+/T9fMrkPZAr2FItzIDCHz7IU8KB0J7PEEuAOSbxFY5t6\nhiuCS3zlFU6VySQLlUYhjZFQ3iwAUw8rqn9wqpgP/ePYb4B2QhrbR4/3E1m1frxH\nZOrKLXAlAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt\ndyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB\nBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp\ncGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQv\n963sWIA/Kp4wxgjsGQ81lAEOujCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIu\naW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk\nci9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG\nKwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy\nGyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL\nBQADggGBADcTbXULe8/ove0xz8APci+XjGxAZHHPGW5Kmk/5BDZiVSMUpZSL7KPn\nuP5FJrZMOgm6DQR3H6mXh9xLk/GEPXukreMGToC/jFz+gSyFo+YaGejb9fQOMSSw\nJFGJqLEibcdAn8ad+vGBLrLrgQupQjA3WhwyzkBh0nFVC21puR2s0Jvb6jiF7B3S\n/a11j89qwqCfrUzqwfNC6aA4u9EmXeB/JtiBz6/nyvO5apzm5rYE3ivWS7Va6MFy\nOAGcFG3V46GHHNltSfJ/qzh7lsB8sNkLCN0PTZxnLH/+QO+UTMjE5mSl3VYYKkIk\nFsy+xH8RE+8R/YTgXVTsNeepo2rO1Cg9ylolNXbONjG7wHWc+TJQO0MP0X5JpSUx\nLtp7STH/ihvVHBx/yfzT/HtjQApT251mIeIVb2fKLSCkza+ftU4oiiSKlmYX2/6+\nTRWvGVz9aqAfuFs+H9LlOr6202hpGvvTr6IcuBx4TV5GDpn+CoE81qHffFXe6TNx\nCB40+lpKWg==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:05 np0005593102 certmonger[38898]: " Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:05 np0005593102 certmonger[38898]: MIIFczCCA9ugAwIBAgIRAO7acHQGHw4EaRgJ3MVBfJAwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:05 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:05 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA1MDVaFw0yODAxMjQwODA1MDVaMD8xETAPBgNVBAoM Jan 23 08:05:05 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:05 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCzIhVKhk9WzfP0 Jan 23 08:05:05 np0005593102 certmonger[38898]: ZGCQ8GHvvPhEkK10w2mses16AF4t/oKItzXoqQaeX8oce2WZuQfmk+Pf6UCR/yFT Jan 23 08:05:05 np0005593102 certmonger[38898]: aForgnnbiBnLDMo8U+V53L3ee0bl0aTm+3EUSbuCtREGDwgigi5X086gY6sq4B/f Jan 23 08:05:05 np0005593102 certmonger[38898]: hwfIM/xNH63ZZkKZ6/J7iHueP2o6GGdEjoO7QwgWz68xEYn6Y8iCY9ajW+B7Q77U Jan 23 08:05:05 np0005593102 certmonger[38898]: kwZfo6o5Js5iXPkQFV3+/T9fMrkPZAr2FItzIDCHz7IU8KB0J7PEEuAOSbxFY5t6 Jan 23 08:05:05 np0005593102 certmonger[38898]: hiuCS3zlFU6VySQLlUYhjZFQ3iwAUw8rqn9wqpgP/ePYb4B2QhrbR4/3E1m1frxH Jan 23 08:05:05 np0005593102 certmonger[38898]: ZOrKLXAlAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:05 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:05 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:05 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQv Jan 23 08:05:05 np0005593102 certmonger[38898]: 963sWIA/Kp4wxgjsGQ81lAEOujCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIu Jan 23 08:05:05 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk Jan 23 08:05:05 np0005593102 certmonger[38898]: ci9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:05 np0005593102 certmonger[38898]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy Jan 23 08:05:05 np0005593102 certmonger[38898]: GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:05 np0005593102 certmonger[38898]: BQADggGBADcTbXULe8/ove0xz8APci+XjGxAZHHPGW5Kmk/5BDZiVSMUpZSL7KPn Jan 23 08:05:05 np0005593102 certmonger[38898]: uP5FJrZMOgm6DQR3H6mXh9xLk/GEPXukreMGToC/jFz+gSyFo+YaGejb9fQOMSSw Jan 23 08:05:05 np0005593102 certmonger[38898]: JFGJqLEibcdAn8ad+vGBLrLrgQupQjA3WhwyzkBh0nFVC21puR2s0Jvb6jiF7B3S Jan 23 08:05:05 np0005593102 certmonger[38898]: /a11j89qwqCfrUzqwfNC6aA4u9EmXeB/JtiBz6/nyvO5apzm5rYE3ivWS7Va6MFy Jan 23 08:05:05 np0005593102 certmonger[38898]: OAGcFG3V46GHHNltSfJ/qzh7lsB8sNkLCN0PTZxnLH/+QO+UTMjE5mSl3VYYKkIk Jan 23 08:05:05 np0005593102 certmonger[38898]: Fsy+xH8RE+8R/YTgXVTsNeepo2rO1Cg9ylolNXbONjG7wHWc+TJQO0MP0X5JpSUx Jan 23 08:05:05 np0005593102 certmonger[38898]: Ltp7STH/ihvVHBx/yfzT/HtjQApT251mIeIVb2fKLSCkza+ftU4oiiSKlmYX2/6+ Jan 23 08:05:05 np0005593102 certmonger[38898]: TRWvGVz9aqAfuFs+H9LlOr6202hpGvvTr6IcuBx4TV5GDpn+CoE81qHffFXe6TNx Jan 23 08:05:05 np0005593102 certmonger[38898]: CB40+lpKWg== Jan 23 08:05:05 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:05 np0005593102 certmonger[38898]: ". Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] No hooks set for pre-save command. Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593102 certmonger[38898]: 2026-01-23 08:05:05 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:06 np0005593102 certmonger[38898]: 2026-01-23 08:05:06 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:06 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:06 np0005593102 certmonger[38898]: 2026-01-23 08:05:06 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:06 np0005593102 certmonger[38898]: 2026-01-23 08:05:06 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:06 np0005593102 certmonger[41680]: Certificate in file "/etc/pki/tls/certs/metrics_qdr.crt" issued by CA and saved. Jan 23 08:05:06 np0005593102 certmonger[38898]: 2026-01-23 08:05:06 [38898] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:07 np0005593102 python3[41696]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:07 np0005593102 python3[41716]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:11 np0005593102 python3[41733]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:14 np0005593102 python3[41750]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:15 np0005593102 python3[41766]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:15 np0005593102 python3[41782]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:16 np0005593102 python3[41800]: ansible-certificate_request Invoked with name=mysql dns=['np0005593102.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['mysql/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:05:16 np0005593102 certmonger[41810]: overcloud.internalapi.ooo.test Jan 23 08:05:16 np0005593102 certmonger[41810]: " for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_REQ_PRINCIPAL" to "mysql/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:05:16 np0005593102 certmonger[41810]: " for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:16 np0005593102 certmonger[41810]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:05:16 np0005593102 certmonger[41810]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuAMlqfkF Jan 23 08:05:16 np0005593102 certmonger[41810]: MBCR5KMw2Y2aqtJzHUwRY+Lb6Lq6vVNhOKvavIAn4gvTydtPqAdQbRVohHZ6URcJ Jan 23 08:05:16 np0005593102 certmonger[41810]: Vyro/gViV7kaDByliGw/c0+ES/lTyvdPYqdjz7Dg144zwgQcMwOj3xyf9Aj3ufDX Jan 23 08:05:16 np0005593102 certmonger[41810]: lehr1+wEQxfUNfYXTsTNt5tSaExf/6BhVFLOUFrjKzLGD9mjkXrnLJDNCPrHMJdC Jan 23 08:05:16 np0005593102 certmonger[41810]: 5dmvZhT6zJcHtgQwxDDioHdUP1/dFo/e4ehvLa8tuyUizjAK+3gfNPQbCXwtK7Pr Jan 23 08:05:16 np0005593102 certmonger[41810]: v5AszCCRIGS9aMovjMCkC+B0TkAqyntOh49nW3kPJwdFn1JkJPmVSbeP+212l69F Jan 23 08:05:16 np0005593102 certmonger[41810]: TU18+cwH6/MQzwIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:16 np0005593102 certmonger[41810]: ADIAMwAwADgAMAA1ADEANjCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Jan 23 08:05:16 np0005593102 certmonger[41810]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:16 np0005593102 certmonger[41810]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Jan 23 08:05:16 np0005593102 certmonger[41810]: FAIDoDIMMG15c3FsL25wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBP Jan 23 08:05:16 np0005593102 certmonger[41810]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Jan 23 08:05:16 np0005593102 certmonger[41810]: bXlzcWwbIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Jan 23 08:05:16 np0005593102 certmonger[41810]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Jan 23 08:05:16 np0005593102 certmonger[41810]: AVzufQRcf+fKw6BOJIVj/vqplj8wDQYJKoZIhvcNAQELBQADggEBAEqOmqoDp1tD Jan 23 08:05:16 np0005593102 certmonger[41810]: Kr8K5ZMoLlkjDt+o56WIfE2HNRvaZY/+5VcTRuqtVj1JDFPMCBS5aK2KYDvpQuTT Jan 23 08:05:16 np0005593102 certmonger[41810]: JOZAgkaQEL5kXdimQoadJLgV2oh40FWbH54+34+kFM9/g+pBCpscARWQl5Z+W7aK Jan 23 08:05:16 np0005593102 certmonger[41810]: TkOl/WiMQc56NZbnog2qMMMgPV/99A7Kp9z82WqL7oeO5O3qkeE49DXNhuIOqhHO Jan 23 08:05:16 np0005593102 certmonger[41810]: wkjVRUCaXwm7CZIOwVt99b++APRv8rdPx6BOh25uUBohT6w5my6XArB8M4B+QuE1 Jan 23 08:05:16 np0005593102 certmonger[41810]: /13GqQMhH7KDCRJJK3km6HYTjHyjO4EMXBnDHHk/vG+FEkbsq1cfJnrF9T2uwdDO Jan 23 08:05:16 np0005593102 certmonger[41810]: CI/XJq4K3PE= Jan 23 08:05:16 np0005593102 certmonger[41810]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:16 np0005593102 certmonger[41810]: " for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuAMlqfkFMBCR5KMw2Y2aqtJzHUwRY+Lb6Lq6vVNhOKvavIAn4gvTydtPqAdQbRVohHZ6URcJVyro/gViV7kaDByliGw/c0+ES/lTyvdPYqdjz7Dg144zwgQcMwOj3xyf9Aj3ufDXlehr1+wEQxfUNfYXTsTNt5tSaExf/6BhVFLOUFrjKzLGD9mjkXrnLJDNCPrHMJdC5dmvZhT6zJcHtgQwxDDioHdUP1/dFo/e4ehvLa8tuyUizjAK+3gfNPQbCXwtK7Prv5AszCCRIGS9aMovjMCkC+B0TkAqyntOh49nW3kPJwdFn1JkJPmVSbeP+212l69FTU18+cwH6/MQzwIDAQAB" for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:16 np0005593102 certmonger[41810]: 2026-01-23 08:05:16 [41810] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:16 np0005593102 certmonger[38898]: 2026-01-23 08:05:16 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:16 np0005593102 certmonger[41810]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:17 np0005593102 certmonger[41810]: Certificate: "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" Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Certificate submission still ongoing. Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Certificate submission attempt complete. Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Child status = 0. Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Child output: Jan 23 08:05:17 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:17 np0005593102 certmonger[38898]: MIIFhjCCA+6gAwIBAgIQKHvtT2AEuYpy0czHvKSMqDANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:17 np0005593102 certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:17 np0005593102 certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDUxN1oXDTI4MDEyNDA4MDUxN1owPzERMA8GA1UECgwI Jan 23 08:05:17 np0005593102 certmonger[38898]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:17 np0005593102 certmonger[38898]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALgDJan5BTAQkeSj Jan 23 08:05:17 np0005593102 certmonger[38898]: MNmNmqrScx1MEWPi2+i6ur1TYTir2ryAJ+IL08nbT6gHUG0VaIR2elEXCVcq6P4F Jan 23 08:05:17 np0005593102 certmonger[38898]: Yle5GgwcpYhsP3NPhEv5U8r3T2KnY8+w4NeOM8IEHDMDo98cn/QI97nw15Xoa9fs Jan 23 08:05:17 np0005593102 certmonger[38898]: BEMX1DX2F07EzbebUmhMX/+gYVRSzlBa4ysyxg/Zo5F65yyQzQj6xzCXQuXZr2YU Jan 23 08:05:17 np0005593102 certmonger[38898]: +syXB7YEMMQw4qB3VD9f3RaP3uHoby2vLbslIs4wCvt4HzT0Gwl8LSuz67+QLMwg Jan 23 08:05:17 np0005593102 certmonger[38898]: kSBkvWjKL4zApAvgdE5AKsp7ToePZ1t5DycHRZ9SZCT5lUm3j/ttdpevRU1NfPnM Jan 23 08:05:17 np0005593102 certmonger[38898]: B+vzEM8CAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:17 np0005593102 certmonger[38898]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:17 np0005593102 certmonger[38898]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:17 np0005593102 certmonger[38898]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:17 np0005593102 certmonger[38898]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:17 np0005593102 certmonger[38898]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOju Jan 23 08:05:17 np0005593102 certmonger[38898]: /jsxXIwHROLSHEdnkLTXGxRKMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMi5p Jan 23 08:05:17 np0005593102 certmonger[38898]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Jan 23 08:05:17 np0005593102 certmonger[38898]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwbXlzcWwvbnAwMDA1NTkzMTAyLmludGVybmFs Jan 23 08:05:17 np0005593102 certmonger[38898]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Jan 23 08:05:17 np0005593102 certmonger[38898]: NTAzoAMCAQGhLDAqGwVteXNxbBshbnAwMDA1NTkzMTAyLmludGVybmFsYXBpLm9v Jan 23 08:05:17 np0005593102 certmonger[38898]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAwYheAFRQkgSXoU3s2OUVuVRREh4PL Jan 23 08:05:17 np0005593102 certmonger[38898]: OVUtrK5Mk9L9BO1B7A6sdbLBdcBlW+DxWtMtRwCA2XA2shFcCVipDtWwK0QoT8Xg Jan 23 08:05:17 np0005593102 certmonger[38898]: qMwqG8eG3NnJdmKrh/MX8p3YUFNRgYJ01cBjqQnNusmU2fd5cigxGDEiXzNYvgDK Jan 23 08:05:17 np0005593102 certmonger[38898]: H2TaoGzHX0UlWGkjaWjkHRyjsRB1QxCVX4ZskW3NsfqzM4u2G5N5vofKQQ5jh5ZF Jan 23 08:05:17 np0005593102 certmonger[38898]: HhEcC6JMkEPNTGiDV4rJUj74Jh32t8rtFoeaxFmsvUSl2vuLx15V2txWD1UsUhWU Jan 23 08:05:17 np0005593102 certmonger[38898]: 9JmKBkmfKkcd/To7D7CwlZk9woBetpeevh6LOgYBncab964KKth7zEM119IL9905 Jan 23 08:05:17 np0005593102 certmonger[38898]: oJGGds9thqqFCyuotucj+/o+pyL1kllZcxNWVDsUL82Q0m9QCan1FQtgkOF4HvdH Jan 23 08:05:17 np0005593102 certmonger[38898]: Ansdi9fc5JC+0VjVIT1bzohjNcDOCP6aBkzOboontNxhYOyJ4F/jB7icXdFc/19Q Jan 23 08:05:17 np0005593102 certmonger[38898]: Dp7nS7eqT6SiRAtegioLQ/Cq7PsZVfOToWw= Jan 23 08:05:17 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:17 np0005593102 certmonger[38898]: " Jan 23 08:05:17 np0005593102 certmonger[41812]: 2026-01-23 08:05:17 [41812] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:17 np0005593102 certmonger[41812]: MIIFhjCCA+6gAwIBAgIQKHvtT2AEuYpy0czHvKSMqDANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:17 np0005593102 certmonger[41812]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:17 np0005593102 certmonger[41812]: aXR5MB4XDTI2MDEyMzA4MDUxN1oXDTI4MDEyNDA4MDUxN1owPzERMA8GA1UECgwI Jan 23 08:05:17 np0005593102 certmonger[41812]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:17 np0005593102 certmonger[41812]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALgDJan5BTAQkeSj Jan 23 08:05:17 np0005593102 certmonger[41812]: MNmNmqrScx1MEWPi2+i6ur1TYTir2ryAJ+IL08nbT6gHUG0VaIR2elEXCVcq6P4F Jan 23 08:05:17 np0005593102 certmonger[41812]: Yle5GgwcpYhsP3NPhEv5U8r3T2KnY8+w4NeOM8IEHDMDo98cn/QI97nw15Xoa9fs Jan 23 08:05:17 np0005593102 certmonger[41812]: BEMX1DX2F07EzbebUmhMX/+gYVRSzlBa4ysyxg/Zo5F65yyQzQj6xzCXQuXZr2YU Jan 23 08:05:17 np0005593102 certmonger[41812]: +syXB7YEMMQw4qB3VD9f3RaP3uHoby2vLbslIs4wCvt4HzT0Gwl8LSuz67+QLMwg Jan 23 08:05:17 np0005593102 certmonger[41812]: kSBkvWjKL4zApAvgdE5AKsp7ToePZ1t5DycHRZ9SZCT5lUm3j/ttdpevRU1NfPnM Jan 23 08:05:17 np0005593102 certmonger[41812]: B+vzEM8CAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:17 np0005593102 certmonger[41812]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:17 np0005593102 certmonger[41812]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:17 np0005593102 certmonger[41812]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:17 np0005593102 certmonger[41812]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:17 np0005593102 certmonger[41812]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOju Jan 23 08:05:17 np0005593102 certmonger[41812]: /jsxXIwHROLSHEdnkLTXGxRKMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMi5p Jan 23 08:05:17 np0005593102 certmonger[41812]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Jan 23 08:05:17 np0005593102 certmonger[41812]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwbXlzcWwvbnAwMDA1NTkzMTAyLmludGVybmFs Jan 23 08:05:17 np0005593102 certmonger[41812]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Jan 23 08:05:17 np0005593102 certmonger[41812]: NTAzoAMCAQGhLDAqGwVteXNxbBshbnAwMDA1NTkzMTAyLmludGVybmFsYXBpLm9v Jan 23 08:05:17 np0005593102 certmonger[41812]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAwYheAFRQkgSXoU3s2OUVuVRREh4PL Jan 23 08:05:17 np0005593102 certmonger[41812]: OVUtrK5Mk9L9BO1B7A6sdbLBdcBlW+DxWtMtRwCA2XA2shFcCVipDtWwK0QoT8Xg Jan 23 08:05:17 np0005593102 certmonger[41812]: qMwqG8eG3NnJdmKrh/MX8p3YUFNRgYJ01cBjqQnNusmU2fd5cigxGDEiXzNYvgDK Jan 23 08:05:17 np0005593102 certmonger[41812]: H2TaoGzHX0UlWGkjaWjkHRyjsRB1QxCVX4ZskW3NsfqzM4u2G5N5vofKQQ5jh5ZF Jan 23 08:05:17 np0005593102 certmonger[41812]: HhEcC6JMkEPNTGiDV4rJUj74Jh32t8rtFoeaxFmsvUSl2vuLx15V2txWD1UsUhWU Jan 23 08:05:17 np0005593102 certmonger[41812]: 9JmKBkmfKkcd/To7D7CwlZk9woBetpeevh6LOgYBncab964KKth7zEM119IL9905 Jan 23 08:05:17 np0005593102 certmonger[41812]: oJGGds9thqqFCyuotucj+/o+pyL1kllZcxNWVDsUL82Q0m9QCan1FQtgkOF4HvdH Jan 23 08:05:17 np0005593102 certmonger[41812]: Ansdi9fc5JC+0VjVIT1bzohjNcDOCP6aBkzOboontNxhYOyJ4F/jB7icXdFc/19Q Jan 23 08:05:17 np0005593102 certmonger[41812]: Dp7nS7eqT6SiRAtegioLQ/Cq7PsZVfOToWw= Jan 23 08:05:17 np0005593102 certmonger[41812]: -----END CERTIFICATE----- Jan 23 08:05:17 np0005593102 certmonger[41812]: ". Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Certificate submission still ongoing. Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Certificate submission postprocessing complete. Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Child status = 0. Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Child output: Jan 23 08:05:17 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nDp7nS7eqT6SiRAtegioLQ/Cq7PsZVfOToWw=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:17 np0005593102 certmonger[38898]: " Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:17 np0005593102 certmonger[38898]: MIIFhjCCA+6gAwIBAgIQKHvtT2AEuYpy0czHvKSMqDANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:17 np0005593102 certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:17 np0005593102 certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDUxN1oXDTI4MDEyNDA4MDUxN1owPzERMA8GA1UECgwI Jan 23 08:05:17 np0005593102 certmonger[38898]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:17 np0005593102 certmonger[38898]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALgDJan5BTAQkeSj Jan 23 08:05:17 np0005593102 certmonger[38898]: MNmNmqrScx1MEWPi2+i6ur1TYTir2ryAJ+IL08nbT6gHUG0VaIR2elEXCVcq6P4F Jan 23 08:05:17 np0005593102 certmonger[38898]: Yle5GgwcpYhsP3NPhEv5U8r3T2KnY8+w4NeOM8IEHDMDo98cn/QI97nw15Xoa9fs Jan 23 08:05:17 np0005593102 certmonger[38898]: BEMX1DX2F07EzbebUmhMX/+gYVRSzlBa4ysyxg/Zo5F65yyQzQj6xzCXQuXZr2YU Jan 23 08:05:17 np0005593102 certmonger[38898]: +syXB7YEMMQw4qB3VD9f3RaP3uHoby2vLbslIs4wCvt4HzT0Gwl8LSuz67+QLMwg Jan 23 08:05:17 np0005593102 certmonger[38898]: kSBkvWjKL4zApAvgdE5AKsp7ToePZ1t5DycHRZ9SZCT5lUm3j/ttdpevRU1NfPnM Jan 23 08:05:17 np0005593102 certmonger[38898]: B+vzEM8CAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:17 np0005593102 certmonger[38898]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:17 np0005593102 certmonger[38898]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:17 np0005593102 certmonger[38898]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:17 np0005593102 certmonger[38898]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:17 np0005593102 certmonger[38898]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOju Jan 23 08:05:17 np0005593102 certmonger[38898]: /jsxXIwHROLSHEdnkLTXGxRKMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMi5p Jan 23 08:05:17 np0005593102 certmonger[38898]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Jan 23 08:05:17 np0005593102 certmonger[38898]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwbXlzcWwvbnAwMDA1NTkzMTAyLmludGVybmFs Jan 23 08:05:17 np0005593102 certmonger[38898]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Jan 23 08:05:17 np0005593102 certmonger[38898]: NTAzoAMCAQGhLDAqGwVteXNxbBshbnAwMDA1NTkzMTAyLmludGVybmFsYXBpLm9v Jan 23 08:05:17 np0005593102 certmonger[38898]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAwYheAFRQkgSXoU3s2OUVuVRREh4PL Jan 23 08:05:17 np0005593102 certmonger[38898]: OVUtrK5Mk9L9BO1B7A6sdbLBdcBlW+DxWtMtRwCA2XA2shFcCVipDtWwK0QoT8Xg Jan 23 08:05:17 np0005593102 certmonger[38898]: qMwqG8eG3NnJdmKrh/MX8p3YUFNRgYJ01cBjqQnNusmU2fd5cigxGDEiXzNYvgDK Jan 23 08:05:17 np0005593102 certmonger[38898]: H2TaoGzHX0UlWGkjaWjkHRyjsRB1QxCVX4ZskW3NsfqzM4u2G5N5vofKQQ5jh5ZF Jan 23 08:05:17 np0005593102 certmonger[38898]: HhEcC6JMkEPNTGiDV4rJUj74Jh32t8rtFoeaxFmsvUSl2vuLx15V2txWD1UsUhWU Jan 23 08:05:17 np0005593102 certmonger[38898]: 9JmKBkmfKkcd/To7D7CwlZk9woBetpeevh6LOgYBncab964KKth7zEM119IL9905 Jan 23 08:05:17 np0005593102 certmonger[38898]: oJGGds9thqqFCyuotucj+/o+pyL1kllZcxNWVDsUL82Q0m9QCan1FQtgkOF4HvdH Jan 23 08:05:17 np0005593102 certmonger[38898]: Ansdi9fc5JC+0VjVIT1bzohjNcDOCP6aBkzOboontNxhYOyJ4F/jB7icXdFc/19Q Jan 23 08:05:17 np0005593102 certmonger[38898]: Dp7nS7eqT6SiRAtegioLQ/Cq7PsZVfOToWw= Jan 23 08:05:17 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:17 np0005593102 certmonger[38898]: ". Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] No hooks set for pre-save command. Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] No hooks set for post-save command. Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:17 np0005593102 certmonger[41816]: Certificate in file "/etc/pki/tls/certs/mysql.crt" issued by CA and saved. Jan 23 08:05:17 np0005593102 certmonger[38898]: 2026-01-23 08:05:17 [38898] Wrote to /var/lib/certmonger/requests/20260123080516 Jan 23 08:05:18 np0005593102 python3[41832]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:05:24 np0005593102 podman[41833]: 2026-01-23 08:05:18.082603853 +0000 UTC m=+0.049276877 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 08:05:24 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:24 np0005593102 python3[41899]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 cluster.common.tag/mariadb:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:05:24 np0005593102 podman[41900]: 2026-01-23 08:05:24.571951394 +0000 UTC m=+0.051781081 image tag b13c44df76d5b3bb87652b20507cc40d62568630b0249319c13c07bbb18c36c3 cluster.common.tag/mariadb:pcmklatest Jan 23 08:05:24 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:25 np0005593102 python3[41927]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:25 np0005593102 python3[41947]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:29 np0005593102 python3[41964]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:32 np0005593102 python3[41981]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:32 np0005593102 python3[41997]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:33 np0005593102 python3[42013]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:34 np0005593102 python3[42031]: ansible-certificate_request Invoked with name=neutron_ovn dns=['np0005593102.internalapi.ooo.test'] principal=['neutron_ovn/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Jan 23 08:05:34 np0005593102 certmonger[38898]: 2026-01-23 08:05:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:34 np0005593102 certmonger[38898]: 2026-01-23 08:05:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:34 np0005593102 certmonger[38898]: 2026-01-23 08:05:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:34 np0005593102 certmonger[38898]: 2026-01-23 08:05:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:34 np0005593102 certmonger[38898]: 2026-01-23 08:05:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:34 np0005593102 certmonger[38898]: 2026-01-23 08:05:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:34 np0005593102 certmonger[38898]: 2026-01-23 08:05:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:34 np0005593102 certmonger[38898]: 2026-01-23 08:05:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:34 np0005593102 certmonger[38898]: 2026-01-23 08:05:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:05:35 np0005593102 certmonger[42041]: " for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_REQ_PRINCIPAL" to "neutron_ovn/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:05:35 np0005593102 certmonger[42041]: " for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:35 np0005593102 certmonger[42041]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:05:35 np0005593102 certmonger[42041]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuHDNN2u6 Jan 23 08:05:35 np0005593102 certmonger[42041]: bWhm+Dna2NCgbCMhKHdgZSjeTNjMBvQzbn7P0AGCw8GO5DOExwvh+aYk5sSKqM/p Jan 23 08:05:35 np0005593102 certmonger[42041]: QGWqrFE+aHxGP63t2PsXkHTqk2pYZnk4cE7k3gox15qJJlQd/ms3msnB/A8Y5JZ0 Jan 23 08:05:35 np0005593102 certmonger[42041]: Pkdx4vc5aYS65Kjz9xVUc9YNtIN3KgR5TcX5d4dnNfcMiTVMDkcucpTJ9uVKpTH7 Jan 23 08:05:35 np0005593102 certmonger[42041]: mBUrDKBCBN7mTYxF6gczCxwzZXl9DNn6cZJzbIGMWfnkv4+8xnzc3kl3MWSIDt/x Jan 23 08:05:35 np0005593102 certmonger[42041]: cRwDB+xr+V7dat1D1t49R7HCGVJUay5xqH5bb9kKndymMTfKJJeLr3zVuhOH6uOc Jan 23 08:05:35 np0005593102 certmonger[42041]: ShhvGR+Ko6nyjQIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:35 np0005593102 certmonger[42041]: ADIAMwAwADgAMAA1ADMANDCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Jan 23 08:05:35 np0005593102 certmonger[42041]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:35 np0005593102 certmonger[42041]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292bi9ucDAwMDU1OTMxMDIu Jan 23 08:05:35 np0005593102 certmonger[42041]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Jan 23 08:05:35 np0005593102 certmonger[42041]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3ZuGyFucDAwMDU1OTMxMDIu Jan 23 08:05:35 np0005593102 certmonger[42041]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Jan 23 08:05:35 np0005593102 certmonger[42041]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFCjwicTG30WxvI5Fu7lKK2c4dPK0 Jan 23 08:05:35 np0005593102 certmonger[42041]: MA0GCSqGSIb3DQEBCwUAA4IBAQBvuIuV3sgLGndlpw0HOQRABpXiL7bPWNoe3PqD Jan 23 08:05:35 np0005593102 certmonger[42041]: 2NHsm0i0jRrd3IauwAZz1fUgizTudX3jDMinaK4lNRgI18aTGGZ2HkgVEgOH4/xt Jan 23 08:05:35 np0005593102 certmonger[42041]: eBIFgJWWe1zVwK2T/UDRPBWVKAujxbcy2igtVBJIlHWbyXxFL9hgGbi/R0eVBNOa Jan 23 08:05:35 np0005593102 certmonger[42041]: AkFVqEX1UkLdKZQVvkz0BAvjvuFGDjuBaCSSDDp/ncgwaVMehfHYWPNtdJVSUVFz Jan 23 08:05:35 np0005593102 certmonger[42041]: MeGB420RVbl29fE0G0jtXTn5FBcHYsj129nsCJufhv10hL1RnQAJGldoIEHR64n7 Jan 23 08:05:35 np0005593102 certmonger[42041]: E74v2vABVTK747r8nkXCypkYyvQIkb3rTYd1v1bq5X8sAsoH Jan 23 08:05:35 np0005593102 certmonger[42041]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:35 np0005593102 certmonger[42041]: " for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuHDNN2u6bWhm+Dna2NCgbCMhKHdgZSjeTNjMBvQzbn7P0AGCw8GO5DOExwvh+aYk5sSKqM/pQGWqrFE+aHxGP63t2PsXkHTqk2pYZnk4cE7k3gox15qJJlQd/ms3msnB/A8Y5JZ0Pkdx4vc5aYS65Kjz9xVUc9YNtIN3KgR5TcX5d4dnNfcMiTVMDkcucpTJ9uVKpTH7mBUrDKBCBN7mTYxF6gczCxwzZXl9DNn6cZJzbIGMWfnkv4+8xnzc3kl3MWSIDt/xcRwDB+xr+V7dat1D1t49R7HCGVJUay5xqH5bb9kKndymMTfKJJeLr3zVuhOH6uOcShhvGR+Ko6nyjQIDAQAB" for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:35 np0005593102 certmonger[42041]: 2026-01-23 08:05:35 [42041] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[42041]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:35 np0005593102 certmonger[42041]: Certificate: "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" Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Certificate submission still ongoing. Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Certificate submission attempt complete. Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Child status = 0. Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Child output: Jan 23 08:05:35 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:35 np0005593102 certmonger[38898]: MIIFcjCCA9qgAwIBAgIQPxz3FkmraHqPXALERukZzjANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:35 np0005593102 certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:35 np0005593102 certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDUzNVoXDTI4MDEyNDA4MDUzNVowPzERMA8GA1UECgwI Jan 23 08:05:35 np0005593102 certmonger[38898]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:35 np0005593102 certmonger[38898]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALhwzTdrum1oZvg5 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2tjQoGwjISh3YGUo3kzYzAb0M25+z9ABgsPBjuQzhMcL4fmmJObEiqjP6UBlqqxR Jan 23 08:05:35 np0005593102 certmonger[38898]: Pmh8Rj+t7dj7F5B06pNqWGZ5OHBO5N4KMdeaiSZUHf5rN5rJwfwPGOSWdD5HceL3 Jan 23 08:05:35 np0005593102 certmonger[38898]: OWmEuuSo8/cVVHPWDbSDdyoEeU3F+XeHZzX3DIk1TA5HLnKUyfblSqUx+5gVKwyg Jan 23 08:05:35 np0005593102 certmonger[38898]: QgTe5k2MReoHMwscM2V5fQzZ+nGSc2yBjFn55L+PvMZ83N5JdzFkiA7f8XEcAwfs Jan 23 08:05:35 np0005593102 certmonger[38898]: a/le3WrdQ9bePUexwhlSVGsucah+W2/ZCp3cpjE3yiSXi6981boTh+rjnEoYbxkf Jan 23 08:05:35 np0005593102 certmonger[38898]: iqOp8o0CAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:35 np0005593102 certmonger[38898]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:35 np0005593102 certmonger[38898]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:35 np0005593102 certmonger[38898]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:35 np0005593102 certmonger[38898]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:35 np0005593102 certmonger[38898]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBxh Jan 23 08:05:35 np0005593102 certmonger[38898]: uuFTBc5O0bRX7qgeglVY0AAtMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMi5p Jan 23 08:05:35 np0005593102 certmonger[38898]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3Zu Jan 23 08:05:35 np0005593102 certmonger[38898]: L25wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:35 np0005593102 certmonger[38898]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4b Jan 23 08:05:35 np0005593102 certmonger[38898]: IW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:35 np0005593102 certmonger[38898]: AAOCAYEABUXf28JKkIiChX3x1nFVaB/gbGRplxz4iA3FV5vzehx7WncP2P9Hdt4f Jan 23 08:05:35 np0005593102 certmonger[38898]: secL6x4ItFxoD7sKCTLUU9gySySYazaYuWOzPb1I0M+45IyA8PODGrTjxaq3n5KW Jan 23 08:05:35 np0005593102 certmonger[38898]: oTX+Lmo2+rkO7ahzDduA4HOA1tS5dMXdsmyqS8gsUYTuG7+A3jF+liBn+GxQBFLe Jan 23 08:05:35 np0005593102 certmonger[38898]: 9Mx410ag+1SjUr0kCVzcg6ZdN1iB9/eNRxSpAOFAgw8Sz+93KeBTqFvspcavyo32 Jan 23 08:05:35 np0005593102 certmonger[38898]: t4HmhMViE2eiHpaPnUG1B8BrEn+BSCM7dvCpByt8xnT5/IMxxWyivWlb1Hi6aLo/ Jan 23 08:05:35 np0005593102 certmonger[38898]: C9cZhKKkafJ0egMtj/Hf4DhqyXFJAg1AlDaWQLnrzFVElSMkWUiJC1gyqPrRPb0V Jan 23 08:05:35 np0005593102 certmonger[38898]: 1yCMxGrmGjWFh6Wq9uBPIhWUPUqttn078QhxVzMo9RSu9AJScEcN0+sjlW3tzaDX Jan 23 08:05:35 np0005593102 certmonger[38898]: 1EApbQ89sz+5UGli7AeSEuWU8lkeAZ7KetrV6icAuBq4YDfKIfDvdi3WS/K9oRR/ Jan 23 08:05:35 np0005593102 certmonger[38898]: 6zNU1hhR Jan 23 08:05:35 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:35 np0005593102 certmonger[38898]: " Jan 23 08:05:35 np0005593102 certmonger[42043]: 2026-01-23 08:05:35 [42043] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:35 np0005593102 certmonger[42043]: MIIFcjCCA9qgAwIBAgIQPxz3FkmraHqPXALERukZzjANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:35 np0005593102 certmonger[42043]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:35 np0005593102 certmonger[42043]: aXR5MB4XDTI2MDEyMzA4MDUzNVoXDTI4MDEyNDA4MDUzNVowPzERMA8GA1UECgwI Jan 23 08:05:35 np0005593102 certmonger[42043]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:35 np0005593102 certmonger[42043]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALhwzTdrum1oZvg5 Jan 23 08:05:35 np0005593102 certmonger[42043]: 2tjQoGwjISh3YGUo3kzYzAb0M25+z9ABgsPBjuQzhMcL4fmmJObEiqjP6UBlqqxR Jan 23 08:05:35 np0005593102 certmonger[42043]: Pmh8Rj+t7dj7F5B06pNqWGZ5OHBO5N4KMdeaiSZUHf5rN5rJwfwPGOSWdD5HceL3 Jan 23 08:05:35 np0005593102 certmonger[42043]: OWmEuuSo8/cVVHPWDbSDdyoEeU3F+XeHZzX3DIk1TA5HLnKUyfblSqUx+5gVKwyg Jan 23 08:05:35 np0005593102 certmonger[42043]: QgTe5k2MReoHMwscM2V5fQzZ+nGSc2yBjFn55L+PvMZ83N5JdzFkiA7f8XEcAwfs Jan 23 08:05:35 np0005593102 certmonger[42043]: a/le3WrdQ9bePUexwhlSVGsucah+W2/ZCp3cpjE3yiSXi6981boTh+rjnEoYbxkf Jan 23 08:05:35 np0005593102 certmonger[42043]: iqOp8o0CAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:35 np0005593102 certmonger[42043]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:35 np0005593102 certmonger[42043]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:35 np0005593102 certmonger[42043]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:35 np0005593102 certmonger[42043]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:35 np0005593102 certmonger[42043]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBxh Jan 23 08:05:35 np0005593102 certmonger[42043]: uuFTBc5O0bRX7qgeglVY0AAtMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMi5p Jan 23 08:05:35 np0005593102 certmonger[42043]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3Zu Jan 23 08:05:35 np0005593102 certmonger[42043]: L25wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:35 np0005593102 certmonger[42043]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4b Jan 23 08:05:35 np0005593102 certmonger[42043]: IW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:35 np0005593102 certmonger[42043]: AAOCAYEABUXf28JKkIiChX3x1nFVaB/gbGRplxz4iA3FV5vzehx7WncP2P9Hdt4f Jan 23 08:05:35 np0005593102 certmonger[42043]: secL6x4ItFxoD7sKCTLUU9gySySYazaYuWOzPb1I0M+45IyA8PODGrTjxaq3n5KW Jan 23 08:05:35 np0005593102 certmonger[42043]: oTX+Lmo2+rkO7ahzDduA4HOA1tS5dMXdsmyqS8gsUYTuG7+A3jF+liBn+GxQBFLe Jan 23 08:05:35 np0005593102 certmonger[42043]: 9Mx410ag+1SjUr0kCVzcg6ZdN1iB9/eNRxSpAOFAgw8Sz+93KeBTqFvspcavyo32 Jan 23 08:05:35 np0005593102 certmonger[42043]: t4HmhMViE2eiHpaPnUG1B8BrEn+BSCM7dvCpByt8xnT5/IMxxWyivWlb1Hi6aLo/ Jan 23 08:05:35 np0005593102 certmonger[42043]: C9cZhKKkafJ0egMtj/Hf4DhqyXFJAg1AlDaWQLnrzFVElSMkWUiJC1gyqPrRPb0V Jan 23 08:05:35 np0005593102 certmonger[42043]: 1yCMxGrmGjWFh6Wq9uBPIhWUPUqttn078QhxVzMo9RSu9AJScEcN0+sjlW3tzaDX Jan 23 08:05:35 np0005593102 certmonger[42043]: 1EApbQ89sz+5UGli7AeSEuWU8lkeAZ7KetrV6icAuBq4YDfKIfDvdi3WS/K9oRR/ Jan 23 08:05:35 np0005593102 certmonger[42043]: 6zNU1hhR Jan 23 08:05:35 np0005593102 certmonger[42043]: -----END CERTIFICATE----- Jan 23 08:05:35 np0005593102 certmonger[42043]: ". Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Certificate submission still ongoing. Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Certificate submission postprocessing complete. Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Child status = 0. Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Child output: Jan 23 08:05:35 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n6zNU1hhR\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:35 np0005593102 certmonger[38898]: " Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:35 np0005593102 certmonger[38898]: MIIFcjCCA9qgAwIBAgIQPxz3FkmraHqPXALERukZzjANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:35 np0005593102 certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:35 np0005593102 certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDUzNVoXDTI4MDEyNDA4MDUzNVowPzERMA8GA1UECgwI Jan 23 08:05:35 np0005593102 certmonger[38898]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:35 np0005593102 certmonger[38898]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALhwzTdrum1oZvg5 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2tjQoGwjISh3YGUo3kzYzAb0M25+z9ABgsPBjuQzhMcL4fmmJObEiqjP6UBlqqxR Jan 23 08:05:35 np0005593102 certmonger[38898]: Pmh8Rj+t7dj7F5B06pNqWGZ5OHBO5N4KMdeaiSZUHf5rN5rJwfwPGOSWdD5HceL3 Jan 23 08:05:35 np0005593102 certmonger[38898]: OWmEuuSo8/cVVHPWDbSDdyoEeU3F+XeHZzX3DIk1TA5HLnKUyfblSqUx+5gVKwyg Jan 23 08:05:35 np0005593102 certmonger[38898]: QgTe5k2MReoHMwscM2V5fQzZ+nGSc2yBjFn55L+PvMZ83N5JdzFkiA7f8XEcAwfs Jan 23 08:05:35 np0005593102 certmonger[38898]: a/le3WrdQ9bePUexwhlSVGsucah+W2/ZCp3cpjE3yiSXi6981boTh+rjnEoYbxkf Jan 23 08:05:35 np0005593102 certmonger[38898]: iqOp8o0CAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:35 np0005593102 certmonger[38898]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:35 np0005593102 certmonger[38898]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:35 np0005593102 certmonger[38898]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:35 np0005593102 certmonger[38898]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:35 np0005593102 certmonger[38898]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBxh Jan 23 08:05:35 np0005593102 certmonger[38898]: uuFTBc5O0bRX7qgeglVY0AAtMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMi5p Jan 23 08:05:35 np0005593102 certmonger[38898]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3Zu Jan 23 08:05:35 np0005593102 certmonger[38898]: L25wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:35 np0005593102 certmonger[38898]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4b Jan 23 08:05:35 np0005593102 certmonger[38898]: IW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:35 np0005593102 certmonger[38898]: AAOCAYEABUXf28JKkIiChX3x1nFVaB/gbGRplxz4iA3FV5vzehx7WncP2P9Hdt4f Jan 23 08:05:35 np0005593102 certmonger[38898]: secL6x4ItFxoD7sKCTLUU9gySySYazaYuWOzPb1I0M+45IyA8PODGrTjxaq3n5KW Jan 23 08:05:35 np0005593102 certmonger[38898]: oTX+Lmo2+rkO7ahzDduA4HOA1tS5dMXdsmyqS8gsUYTuG7+A3jF+liBn+GxQBFLe Jan 23 08:05:35 np0005593102 certmonger[38898]: 9Mx410ag+1SjUr0kCVzcg6ZdN1iB9/eNRxSpAOFAgw8Sz+93KeBTqFvspcavyo32 Jan 23 08:05:35 np0005593102 certmonger[38898]: t4HmhMViE2eiHpaPnUG1B8BrEn+BSCM7dvCpByt8xnT5/IMxxWyivWlb1Hi6aLo/ Jan 23 08:05:35 np0005593102 certmonger[38898]: C9cZhKKkafJ0egMtj/Hf4DhqyXFJAg1AlDaWQLnrzFVElSMkWUiJC1gyqPrRPb0V Jan 23 08:05:35 np0005593102 certmonger[38898]: 1yCMxGrmGjWFh6Wq9uBPIhWUPUqttn078QhxVzMo9RSu9AJScEcN0+sjlW3tzaDX Jan 23 08:05:35 np0005593102 certmonger[38898]: 1EApbQ89sz+5UGli7AeSEuWU8lkeAZ7KetrV6icAuBq4YDfKIfDvdi3WS/K9oRR/ Jan 23 08:05:35 np0005593102 certmonger[38898]: 6zNU1hhR Jan 23 08:05:35 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:35 np0005593102 certmonger[38898]: ". Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] No hooks set for pre-save command. Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] No hooks set for post-save command. Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:35 np0005593102 certmonger[42047]: Certificate in file "/etc/pki/tls/certs/neutron_ovn.crt" issued by CA and saved. Jan 23 08:05:35 np0005593102 certmonger[38898]: 2026-01-23 08:05:35 [38898] Wrote to /var/lib/certmonger/requests/20260123080534 Jan 23 08:05:36 np0005593102 python3[42063]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:37 np0005593102 python3[42083]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:40 np0005593102 python3[42100]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:43 np0005593102 python3[42117]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:43 np0005593102 python3[42133]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:44 np0005593102 python3[42149]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:45 np0005593102 python3[42167]: ansible-certificate_request Invoked with name=libvirt-vnc-client-cert dns=['np0005593102.internalapi.ooo.test'] principal=['libvirt-vnc/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/libvirt-vnc-client-cert.crt"#012service_key="/etc/pki/tls/private/libvirt-vnc-client-cert.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:05:45 np0005593102 certmonger[42177]: " for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_REQ_PRINCIPAL" to "libvirt-vnc/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:05:45 np0005593102 certmonger[42177]: " for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:45 np0005593102 certmonger[42177]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:05:45 np0005593102 certmonger[42177]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxndgCunF Jan 23 08:05:45 np0005593102 certmonger[42177]: 1xobobt7aos8/JWo+/hcd1nDZJzO/kcotnTnTz0RrMLhm2RqO6cDkJnZyHHC9GDu Jan 23 08:05:45 np0005593102 certmonger[42177]: Z9xngQKCqqWLCyH+t4rhFWA4geR3atvKHetDRff/Uv27ovWKFb8RdLe1Yzg6s2Y0 Jan 23 08:05:45 np0005593102 certmonger[42177]: mkwPvHCdc+s17jfFjeirC0tVetQkwWD5dSya2PQ7Tg8e3O0ktC83J8+0056kxOZi Jan 23 08:05:45 np0005593102 certmonger[42177]: sw1g7YfgqYwT7ik8+7eIDsKKuVfTwk7RdelwYQh8qF1D3UvnqimvuuZ28nMr1Zk9 Jan 23 08:05:45 np0005593102 certmonger[42177]: vhOG7d/gWAeD1JIdKv48wgOZD2kfEg2rPT2evftpYcJzrA8dvRBEGr+1d8ONQbbn Jan 23 08:05:45 np0005593102 certmonger[42177]: NaYGqWjK8QaKEwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:45 np0005593102 certmonger[42177]: ADIAMwAwADgAMAA1ADQANTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Jan 23 08:05:45 np0005593102 certmonger[42177]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:45 np0005593102 certmonger[42177]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZuYy9ucDAwMDU1OTMxMDIu Jan 23 08:05:45 np0005593102 certmonger[42177]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Jan 23 08:05:45 np0005593102 certmonger[42177]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5jGyFucDAwMDU1OTMxMDIu Jan 23 08:05:45 np0005593102 certmonger[42177]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Jan 23 08:05:45 np0005593102 certmonger[42177]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFIPp2Z/dpq/Fo7woD0a9WZ1rPhB2 Jan 23 08:05:45 np0005593102 certmonger[42177]: MA0GCSqGSIb3DQEBCwUAA4IBAQC9HA8YyyvhMgL8BFJSjquzpFxmGOtYPakm5bt3 Jan 23 08:05:45 np0005593102 certmonger[42177]: z810n9aqs1AKGWapf2tPz4FA5/vtXWmIgSjjt0z3hqoa9mL37ekWnn6qDgTzP4gi Jan 23 08:05:45 np0005593102 certmonger[42177]: 2KZD8/lwk2O0kMZS8omBYy1nyo3fkUYUTrRudXHp0ymmylSomtBDllU9su7Z1KDz Jan 23 08:05:45 np0005593102 certmonger[42177]: bUp6KahUabq4XvWsztWkIDrN8vqS384LM6a8BHkjLI9Dtss/HMtoei7M0KZajC16 Jan 23 08:05:45 np0005593102 certmonger[42177]: rhgsvn0ODWTQhdBjl4E6OvtU6bQWSGJnmbCzduoC9xPZZa+cyX6q+SQlNvYa8q0H Jan 23 08:05:45 np0005593102 certmonger[42177]: tIYcs6K129pXfp5SvjW9zTMvGXEqgVDEQWhDeTEapAyFEb0H Jan 23 08:05:45 np0005593102 certmonger[42177]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:45 np0005593102 certmonger[42177]: " for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGd2AK6cXXGhuhu3tqizz8laj7+Fx3WcNknM7+Ryi2dOdPPRGswuGbZGo7pwOQmdnIccL0YO5n3GeBAoKqpYsLIf63iuEVYDiB5Hdq28od60NF9/9S/bui9YoVvxF0t7VjODqzZjSaTA+8cJ1z6zXuN8WN6KsLS1V61CTBYPl1LJrY9DtODx7c7SS0Lzcnz7TTnqTE5mKzDWDth+CpjBPuKTz7t4gOwoq5V9PCTtF16XBhCHyoXUPdS+eqKa+65nbycyvVmT2+E4bt3+BYB4PUkh0q/jzCA5kPaR8SDas9PZ69+2lhwnOsDx29EEQav7V3w41Btuc1pgapaMrxBooTAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAcZ9Alvlemz3Bzrl56EUYFXS9CVLqLB5S5BRpZSfx8at45JSbctRqnbiaZQdyrxey3G/emJ89r5OH3dRr23/z/qlZISWdQXSZKBGHqq5OxDkUuUICrQw36oFgsnL4yQF8a1nlTtycOQ0QUXNfyxaa7CGsxPcqmyFehmPNrHRqsFeEBSER8gqi5ri2k8rXlAgxCNy9T98zFhS+bgFb/EFeFiKHZbKcoHkUHsFVFyQQYKM8jf+aoTa5dGyACR1KtYQ9wjePoMMMmbTcsivgw5fn8GdqJz7PkXdpCPQFzPgYemZfQTRMlGTql4o0ZvF8du43mJvqRd50yMDlSW66K3Ebhw==" for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxndgCunF1xobobt7aos8/JWo+/hcd1nDZJzO/kcotnTnTz0RrMLhm2RqO6cDkJnZyHHC9GDuZ9xngQKCqqWLCyH+t4rhFWA4geR3atvKHetDRff/Uv27ovWKFb8RdLe1Yzg6s2Y0mkwPvHCdc+s17jfFjeirC0tVetQkwWD5dSya2PQ7Tg8e3O0ktC83J8+0056kxOZisw1g7YfgqYwT7ik8+7eIDsKKuVfTwk7RdelwYQh8qF1D3UvnqimvuuZ28nMr1Zk9vhOG7d/gWAeD1JIdKv48wgOZD2kfEg2rPT2evftpYcJzrA8dvRBEGr+1d8ONQbbnNaYGqWjK8QaKEwIDAQAB" for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:45 np0005593102 certmonger[42177]: 2026-01-23 08:05:45 [42177] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:45 np0005593102 certmonger[38898]: 2026-01-23 08:05:45 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593102 certmonger[42177]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:46 np0005593102 certmonger[42177]: Certificate: "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" Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Certificate submission still ongoing. Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Certificate submission attempt complete. Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Child status = 0. Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Child output: Jan 23 08:05:46 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:46 np0005593102 certmonger[38898]: MIIFcjCCA9qgAwIBAgIQfVgA0S5U0Ik3MrzLK+UonTANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:46 np0005593102 certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:46 np0005593102 certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDU0NVoXDTI4MDEyNDA4MDU0NVowPzERMA8GA1UECgwI Jan 23 08:05:46 np0005593102 certmonger[38898]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:46 np0005593102 certmonger[38898]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMZ3YArpxdcaG6G7 Jan 23 08:05:46 np0005593102 certmonger[38898]: e2qLPPyVqPv4XHdZw2Sczv5HKLZ05089EazC4ZtkajunA5CZ2chxwvRg7mfcZ4EC Jan 23 08:05:46 np0005593102 certmonger[38898]: gqqliwsh/reK4RVgOIHkd2rbyh3rQ0X3/1L9u6L1ihW/EXS3tWM4OrNmNJpMD7xw Jan 23 08:05:46 np0005593102 certmonger[38898]: nXPrNe43xY3oqwtLVXrUJMFg+XUsmtj0O04PHtztJLQvNyfPtNOepMTmYrMNYO2H Jan 23 08:05:46 np0005593102 certmonger[38898]: 4KmME+4pPPu3iA7CirlX08JO0XXpcGEIfKhdQ91L56opr7rmdvJzK9WZPb4Thu3f Jan 23 08:05:46 np0005593102 certmonger[38898]: 4FgHg9SSHSr+PMIDmQ9pHxINqz09nr37aWHCc6wPHb0QRBq/tXfDjUG25zWmBqlo Jan 23 08:05:46 np0005593102 certmonger[38898]: yvEGihMCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:46 np0005593102 certmonger[38898]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593102 certmonger[38898]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:46 np0005593102 certmonger[38898]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593102 certmonger[38898]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:46 np0005593102 certmonger[38898]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFAoB Jan 23 08:05:46 np0005593102 certmonger[38898]: cRX5QgM9WEu7QrsmAUXSJy6OMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMi5p Jan 23 08:05:46 np0005593102 certmonger[38898]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5j Jan 23 08:05:46 np0005593102 certmonger[38898]: L25wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:46 np0005593102 certmonger[38898]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMb Jan 23 08:05:46 np0005593102 certmonger[38898]: IW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:46 np0005593102 certmonger[38898]: AAOCAYEAvCZ5P6f57jrgZ+lOPC+tCHPvxUVVqVeBusPszozHOZrLMlpHp5uTlsMq Jan 23 08:05:46 np0005593102 certmonger[38898]: FhEoPD3UgJagfkrXyh2AFZ4gPb4FpYQnt5rGel6whz5vYXvyRGejq355C06Po6AT Jan 23 08:05:46 np0005593102 certmonger[38898]: TxQce6mtiFAUywCCiTUhNy/ISwHrb8o9+YhtJ75/NzmAA0WhzqNA6YEhVmaRUM3g Jan 23 08:05:46 np0005593102 certmonger[38898]: V5Q85FRJqqAYaJwto/12NgjoIoMeUGaLpNUPbhDWxtD/CqTmSavaLAG/1qMLDnXZ Jan 23 08:05:46 np0005593102 certmonger[38898]: YFR86MdePt2DrWsuYUTl5mcWBd2zidfq4R00oC/Ml309yiFfA02mOfbzzpwmoqi+ Jan 23 08:05:46 np0005593102 certmonger[38898]: jW7unJsUVRKpEWPmDsohmr6wjaHTynYCTvjU60MNBJz7Uei6BnrPN6zMkYdyPD/K Jan 23 08:05:46 np0005593102 certmonger[38898]: VKIiqPaBxFtzEbJEw0iUPUEAMZeNqVUr1ip1UbkphXeZUBTypGOulYm++fZYGeUj Jan 23 08:05:46 np0005593102 certmonger[38898]: rvYZ9h7RiopP1hiaTD+lb/b5m05GuWg8sv2b9BvGYY5++ljKwZGKJ9ohnfnd75bT Jan 23 08:05:46 np0005593102 certmonger[38898]: 5RM/8RJh Jan 23 08:05:46 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:46 np0005593102 certmonger[38898]: " Jan 23 08:05:46 np0005593102 certmonger[42179]: 2026-01-23 08:05:46 [42179] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:46 np0005593102 certmonger[42179]: MIIFcjCCA9qgAwIBAgIQfVgA0S5U0Ik3MrzLK+UonTANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:46 np0005593102 certmonger[42179]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:46 np0005593102 certmonger[42179]: aXR5MB4XDTI2MDEyMzA4MDU0NVoXDTI4MDEyNDA4MDU0NVowPzERMA8GA1UECgwI Jan 23 08:05:46 np0005593102 certmonger[42179]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:46 np0005593102 certmonger[42179]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMZ3YArpxdcaG6G7 Jan 23 08:05:46 np0005593102 certmonger[42179]: e2qLPPyVqPv4XHdZw2Sczv5HKLZ05089EazC4ZtkajunA5CZ2chxwvRg7mfcZ4EC Jan 23 08:05:46 np0005593102 certmonger[42179]: gqqliwsh/reK4RVgOIHkd2rbyh3rQ0X3/1L9u6L1ihW/EXS3tWM4OrNmNJpMD7xw Jan 23 08:05:46 np0005593102 certmonger[42179]: nXPrNe43xY3oqwtLVXrUJMFg+XUsmtj0O04PHtztJLQvNyfPtNOepMTmYrMNYO2H Jan 23 08:05:46 np0005593102 certmonger[42179]: 4KmME+4pPPu3iA7CirlX08JO0XXpcGEIfKhdQ91L56opr7rmdvJzK9WZPb4Thu3f Jan 23 08:05:46 np0005593102 certmonger[42179]: 4FgHg9SSHSr+PMIDmQ9pHxINqz09nr37aWHCc6wPHb0QRBq/tXfDjUG25zWmBqlo Jan 23 08:05:46 np0005593102 certmonger[42179]: yvEGihMCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:46 np0005593102 certmonger[42179]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593102 certmonger[42179]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:46 np0005593102 certmonger[42179]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593102 certmonger[42179]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:46 np0005593102 certmonger[42179]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFAoB Jan 23 08:05:46 np0005593102 certmonger[42179]: cRX5QgM9WEu7QrsmAUXSJy6OMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMi5p Jan 23 08:05:46 np0005593102 certmonger[42179]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5j Jan 23 08:05:46 np0005593102 certmonger[42179]: L25wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:46 np0005593102 certmonger[42179]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMb Jan 23 08:05:46 np0005593102 certmonger[42179]: IW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:46 np0005593102 certmonger[42179]: AAOCAYEAvCZ5P6f57jrgZ+lOPC+tCHPvxUVVqVeBusPszozHOZrLMlpHp5uTlsMq Jan 23 08:05:46 np0005593102 certmonger[42179]: FhEoPD3UgJagfkrXyh2AFZ4gPb4FpYQnt5rGel6whz5vYXvyRGejq355C06Po6AT Jan 23 08:05:46 np0005593102 certmonger[42179]: TxQce6mtiFAUywCCiTUhNy/ISwHrb8o9+YhtJ75/NzmAA0WhzqNA6YEhVmaRUM3g Jan 23 08:05:46 np0005593102 certmonger[42179]: V5Q85FRJqqAYaJwto/12NgjoIoMeUGaLpNUPbhDWxtD/CqTmSavaLAG/1qMLDnXZ Jan 23 08:05:46 np0005593102 certmonger[42179]: YFR86MdePt2DrWsuYUTl5mcWBd2zidfq4R00oC/Ml309yiFfA02mOfbzzpwmoqi+ Jan 23 08:05:46 np0005593102 certmonger[42179]: jW7unJsUVRKpEWPmDsohmr6wjaHTynYCTvjU60MNBJz7Uei6BnrPN6zMkYdyPD/K Jan 23 08:05:46 np0005593102 certmonger[42179]: VKIiqPaBxFtzEbJEw0iUPUEAMZeNqVUr1ip1UbkphXeZUBTypGOulYm++fZYGeUj Jan 23 08:05:46 np0005593102 certmonger[42179]: rvYZ9h7RiopP1hiaTD+lb/b5m05GuWg8sv2b9BvGYY5++ljKwZGKJ9ohnfnd75bT Jan 23 08:05:46 np0005593102 certmonger[42179]: 5RM/8RJh Jan 23 08:05:46 np0005593102 certmonger[42179]: -----END CERTIFICATE----- Jan 23 08:05:46 np0005593102 certmonger[42179]: ". Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Certificate submission still ongoing. Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Certificate submission postprocessing complete. Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Child status = 0. Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Child output: Jan 23 08:05:46 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n5RM/8RJh\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:46 np0005593102 certmonger[38898]: " Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:46 np0005593102 certmonger[38898]: MIIFcjCCA9qgAwIBAgIQfVgA0S5U0Ik3MrzLK+UonTANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:46 np0005593102 certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:46 np0005593102 certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDU0NVoXDTI4MDEyNDA4MDU0NVowPzERMA8GA1UECgwI Jan 23 08:05:46 np0005593102 certmonger[38898]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:46 np0005593102 certmonger[38898]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMZ3YArpxdcaG6G7 Jan 23 08:05:46 np0005593102 certmonger[38898]: e2qLPPyVqPv4XHdZw2Sczv5HKLZ05089EazC4ZtkajunA5CZ2chxwvRg7mfcZ4EC Jan 23 08:05:46 np0005593102 certmonger[38898]: gqqliwsh/reK4RVgOIHkd2rbyh3rQ0X3/1L9u6L1ihW/EXS3tWM4OrNmNJpMD7xw Jan 23 08:05:46 np0005593102 certmonger[38898]: nXPrNe43xY3oqwtLVXrUJMFg+XUsmtj0O04PHtztJLQvNyfPtNOepMTmYrMNYO2H Jan 23 08:05:46 np0005593102 certmonger[38898]: 4KmME+4pPPu3iA7CirlX08JO0XXpcGEIfKhdQ91L56opr7rmdvJzK9WZPb4Thu3f Jan 23 08:05:46 np0005593102 certmonger[38898]: 4FgHg9SSHSr+PMIDmQ9pHxINqz09nr37aWHCc6wPHb0QRBq/tXfDjUG25zWmBqlo Jan 23 08:05:46 np0005593102 certmonger[38898]: yvEGihMCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:46 np0005593102 certmonger[38898]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593102 certmonger[38898]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:46 np0005593102 certmonger[38898]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593102 certmonger[38898]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:46 np0005593102 certmonger[38898]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFAoB Jan 23 08:05:46 np0005593102 certmonger[38898]: cRX5QgM9WEu7QrsmAUXSJy6OMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMi5p Jan 23 08:05:46 np0005593102 certmonger[38898]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5j Jan 23 08:05:46 np0005593102 certmonger[38898]: L25wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:46 np0005593102 certmonger[38898]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMb Jan 23 08:05:46 np0005593102 certmonger[38898]: IW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:46 np0005593102 certmonger[38898]: AAOCAYEAvCZ5P6f57jrgZ+lOPC+tCHPvxUVVqVeBusPszozHOZrLMlpHp5uTlsMq Jan 23 08:05:46 np0005593102 certmonger[38898]: FhEoPD3UgJagfkrXyh2AFZ4gPb4FpYQnt5rGel6whz5vYXvyRGejq355C06Po6AT Jan 23 08:05:46 np0005593102 certmonger[38898]: TxQce6mtiFAUywCCiTUhNy/ISwHrb8o9+YhtJ75/NzmAA0WhzqNA6YEhVmaRUM3g Jan 23 08:05:46 np0005593102 certmonger[38898]: V5Q85FRJqqAYaJwto/12NgjoIoMeUGaLpNUPbhDWxtD/CqTmSavaLAG/1qMLDnXZ Jan 23 08:05:46 np0005593102 certmonger[38898]: YFR86MdePt2DrWsuYUTl5mcWBd2zidfq4R00oC/Ml309yiFfA02mOfbzzpwmoqi+ Jan 23 08:05:46 np0005593102 certmonger[38898]: jW7unJsUVRKpEWPmDsohmr6wjaHTynYCTvjU60MNBJz7Uei6BnrPN6zMkYdyPD/K Jan 23 08:05:46 np0005593102 certmonger[38898]: VKIiqPaBxFtzEbJEw0iUPUEAMZeNqVUr1ip1UbkphXeZUBTypGOulYm++fZYGeUj Jan 23 08:05:46 np0005593102 certmonger[38898]: rvYZ9h7RiopP1hiaTD+lb/b5m05GuWg8sv2b9BvGYY5++ljKwZGKJ9ohnfnd75bT Jan 23 08:05:46 np0005593102 certmonger[38898]: 5RM/8RJh Jan 23 08:05:46 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:46 np0005593102 certmonger[38898]: ". Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] No hooks set for pre-save command. Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:46 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593102 certmonger[42256]: Certificate in file "/etc/pki/tls/certs/libvirt-vnc-client-cert.crt" issued by CA and saved. Jan 23 08:05:46 np0005593102 certmonger[38898]: 2026-01-23 08:05:46 [38898] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:47 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:47 np0005593102 python3[42272]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:48 np0005593102 python3[42292]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:51 np0005593102 python3[42309]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:54 np0005593102 python3[42524]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:54 np0005593102 python3[42540]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:55 np0005593102 python3[42556]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:55 np0005593102 python3[42574]: ansible-certificate_request Invoked with name=novnc-proxy dns=['np0005593102.internalapi.ooo.test'] principal=['novnc-proxy/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/novnc-proxy.crt"#012service_key="/etc/pki/tls/private/novnc-proxy.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:05:56 np0005593102 certmonger[42584]: " for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_REQ_PRINCIPAL" to "novnc-proxy/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:05:56 np0005593102 certmonger[42584]: " for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:56 np0005593102 certmonger[42584]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:05:56 np0005593102 certmonger[42584]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApBO7beuV Jan 23 08:05:56 np0005593102 certmonger[42584]: V2IzA8Mvm2eNKuWan4O1YUQEQXykiPN6w7I1Yl5A8l+9xd49iz9eTkAYTtA/E2oE Jan 23 08:05:56 np0005593102 certmonger[42584]: l9p4SsRJSz//vCqfWbtjDimbptfgxzjbWQ2bGkt82hwdTjkkOZdFW1P2b1lrKcIs Jan 23 08:05:56 np0005593102 certmonger[42584]: T9lV7xPE106kChPp8zIiJwgWn7njBVaKRRreQfDG3qplbYrSYdmnlz6xl3huV91i Jan 23 08:05:56 np0005593102 certmonger[42584]: 4wKZxG2J60AQhAWXJlJp2kLFgjyyJdvfhyUNuhiILVhTrtct4Ra5ZqXSllIEkrGL Jan 23 08:05:56 np0005593102 certmonger[42584]: tXx4tXvpB/c3QhriscI9bVerJoSjXEMsDOmf96Ow6V9I0nSDWP5lwO4cZlMAYS9n Jan 23 08:05:56 np0005593102 certmonger[42584]: cvWWgZpH76FrPwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:56 np0005593102 certmonger[42584]: ADIAMwAwADgAMAA1ADUANjCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Jan 23 08:05:56 np0005593102 certmonger[42584]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:56 np0005593102 certmonger[42584]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94eS9ucDAwMDU1OTMxMDIu Jan 23 08:05:56 np0005593102 certmonger[42584]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Jan 23 08:05:56 np0005593102 certmonger[42584]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5GyFucDAwMDU1OTMxMDIu Jan 23 08:05:56 np0005593102 certmonger[42584]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Jan 23 08:05:56 np0005593102 certmonger[42584]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFN/uw5Om7YMm4KylKcYU/RoGYrTl Jan 23 08:05:56 np0005593102 certmonger[42584]: MA0GCSqGSIb3DQEBCwUAA4IBAQBSLX/kESRbjGmGQyaPwaNrGj/t9kxhpPf3kr6k Jan 23 08:05:56 np0005593102 certmonger[42584]: 7aodTEoGsbSO5Hs3R+HQk5jGtcj3TdQPMJGb1yHucamzNAWZlil92RT3u1VixoI6 Jan 23 08:05:56 np0005593102 certmonger[42584]: rcJUO0611qWc89JbzcxW2OiVJNDgPj+NY+M9Ht/uC5AaWkEOumvO5tX4W9HS5233 Jan 23 08:05:56 np0005593102 certmonger[42584]: Wrtl4W/NP6TmLSwxZM2S8GbYgnwcWzJnlJA+K8a0fFIORSEv+IPlohaBCPo1a1XM Jan 23 08:05:56 np0005593102 certmonger[42584]: haCLNsS0hqJZn+yUmU09iXAgcu72lzEnniLVxgGZS1CDIMo/ytQuQs9S5GW/DbZb Jan 23 08:05:56 np0005593102 certmonger[42584]: g9WJtFMJMQ8wrJqLd/Wki54c8gspYbA8L4nidGLSRyPePafL Jan 23 08:05:56 np0005593102 certmonger[42584]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:56 np0005593102 certmonger[42584]: " for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApBO7beuVV2IzA8Mvm2eNKuWan4O1YUQEQXykiPN6w7I1Yl5A8l+9xd49iz9eTkAYTtA/E2oEl9p4SsRJSz//vCqfWbtjDimbptfgxzjbWQ2bGkt82hwdTjkkOZdFW1P2b1lrKcIsT9lV7xPE106kChPp8zIiJwgWn7njBVaKRRreQfDG3qplbYrSYdmnlz6xl3huV91i4wKZxG2J60AQhAWXJlJp2kLFgjyyJdvfhyUNuhiILVhTrtct4Ra5ZqXSllIEkrGLtXx4tXvpB/c3QhriscI9bVerJoSjXEMsDOmf96Ow6V9I0nSDWP5lwO4cZlMAYS9ncvWWgZpH76FrPwIDAQAB" for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:56 np0005593102 certmonger[42584]: 2026-01-23 08:05:56 [42584] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[42584]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:56 np0005593102 certmonger[42584]: Certificate: "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" Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Certificate submission still ongoing. Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Certificate submission attempt complete. Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Child status = 0. Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Child output: Jan 23 08:05:56 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:56 np0005593102 certmonger[38898]: MIIFczCCA9ugAwIBAgIRAOtwj5mTOYWYgdn6dCnWPrEwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:56 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:56 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA1NTZaFw0yODAxMjQwODA1NTZaMD8xETAPBgNVBAoM Jan 23 08:05:56 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:56 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCkE7tt65VXYjMD Jan 23 08:05:56 np0005593102 certmonger[38898]: wy+bZ40q5Zqfg7VhRARBfKSI83rDsjViXkDyX73F3j2LP15OQBhO0D8TagSX2nhK Jan 23 08:05:56 np0005593102 certmonger[38898]: xElLP/+8Kp9Zu2MOKZum1+DHONtZDZsaS3zaHB1OOSQ5l0VbU/ZvWWspwixP2VXv Jan 23 08:05:56 np0005593102 certmonger[38898]: E8TXTqQKE+nzMiInCBafueMFVopFGt5B8MbeqmVtitJh2aeXPrGXeG5X3WLjApnE Jan 23 08:05:56 np0005593102 certmonger[38898]: bYnrQBCEBZcmUmnaQsWCPLIl29+HJQ26GIgtWFOu1y3hFrlmpdKWUgSSsYu1fHi1 Jan 23 08:05:56 np0005593102 certmonger[38898]: e+kH9zdCGuKxwj1tV6smhKNcQywM6Z/3o7DpX0jSdINY/mXA7hxmUwBhL2dy9ZaB Jan 23 08:05:56 np0005593102 certmonger[38898]: mkfvoWs/AgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:56 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:56 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:56 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:56 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:56 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQc Jan 23 08:05:56 np0005593102 certmonger[38898]: xgW4iiG0JUaA3ssOnMGuhmuNVjCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIu Jan 23 08:05:56 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94 Jan 23 08:05:56 np0005593102 certmonger[38898]: eS9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:56 np0005593102 certmonger[38898]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5 Jan 23 08:05:56 np0005593102 certmonger[38898]: GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:56 np0005593102 certmonger[38898]: BQADggGBAKc17HVyQjz73Xqc323JFnSE3su/AS8rhWYwuOpduBpGu2gTtbZz1OCV Jan 23 08:05:56 np0005593102 certmonger[38898]: ZtOHxrjbYvHsYuqj7xaEm9iUNw9JbynXcmrHHfXpdIiWUMeR3fQTBST3vmIu3sqh Jan 23 08:05:56 np0005593102 certmonger[38898]: p7NFAYPSgKJWq6gsPNMbUoWhVWxZDSNU6IdRcHqmPhvv8vmrNEaNY5e3C68luzR3 Jan 23 08:05:56 np0005593102 certmonger[38898]: oPRj1bYvBACbeMWHKPzit/3QVsmFawGeFT//B5/Imw9g6VGcML40aA5NyeAb4Wh6 Jan 23 08:05:56 np0005593102 certmonger[38898]: y2AXKhUf5XkTE6VllNEnPu3vMUgOEfe+wCHtqTshvoMyKmTrH0WOIDeveFYPOXNS Jan 23 08:05:56 np0005593102 certmonger[38898]: vgrGKZaRjAzbxU0TozHS8ZaX78KsQhgvdfKExEIOsXfvqNKlDDYBHhVwkWZ07UfT Jan 23 08:05:56 np0005593102 certmonger[38898]: 6nhhXXNQxrKvwS5NTcXf1RS5oOzs3Du653PAaLPxPE+IOt+Is+OKb6syVnul3doC Jan 23 08:05:56 np0005593102 certmonger[38898]: SRhV9vg79WcjtJA/h7gorvY76nUuhQwrj0E/cwB9aYWAQUK8p06nhOtToSKHfAY4 Jan 23 08:05:56 np0005593102 certmonger[38898]: a3WQ4eaP4g== Jan 23 08:05:56 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:56 np0005593102 certmonger[38898]: " Jan 23 08:05:56 np0005593102 certmonger[42586]: 2026-01-23 08:05:56 [42586] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:56 np0005593102 certmonger[42586]: MIIFczCCA9ugAwIBAgIRAOtwj5mTOYWYgdn6dCnWPrEwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:56 np0005593102 certmonger[42586]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:56 np0005593102 certmonger[42586]: cml0eTAeFw0yNjAxMjMwODA1NTZaFw0yODAxMjQwODA1NTZaMD8xETAPBgNVBAoM Jan 23 08:05:56 np0005593102 certmonger[42586]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:56 np0005593102 certmonger[42586]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCkE7tt65VXYjMD Jan 23 08:05:56 np0005593102 certmonger[42586]: wy+bZ40q5Zqfg7VhRARBfKSI83rDsjViXkDyX73F3j2LP15OQBhO0D8TagSX2nhK Jan 23 08:05:56 np0005593102 certmonger[42586]: xElLP/+8Kp9Zu2MOKZum1+DHONtZDZsaS3zaHB1OOSQ5l0VbU/ZvWWspwixP2VXv Jan 23 08:05:56 np0005593102 certmonger[42586]: E8TXTqQKE+nzMiInCBafueMFVopFGt5B8MbeqmVtitJh2aeXPrGXeG5X3WLjApnE Jan 23 08:05:56 np0005593102 certmonger[42586]: bYnrQBCEBZcmUmnaQsWCPLIl29+HJQ26GIgtWFOu1y3hFrlmpdKWUgSSsYu1fHi1 Jan 23 08:05:56 np0005593102 certmonger[42586]: e+kH9zdCGuKxwj1tV6smhKNcQywM6Z/3o7DpX0jSdINY/mXA7hxmUwBhL2dy9ZaB Jan 23 08:05:56 np0005593102 certmonger[42586]: mkfvoWs/AgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:56 np0005593102 certmonger[42586]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:56 np0005593102 certmonger[42586]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:56 np0005593102 certmonger[42586]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:56 np0005593102 certmonger[42586]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:56 np0005593102 certmonger[42586]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQc Jan 23 08:05:56 np0005593102 certmonger[42586]: xgW4iiG0JUaA3ssOnMGuhmuNVjCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIu Jan 23 08:05:56 np0005593102 certmonger[42586]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94 Jan 23 08:05:56 np0005593102 certmonger[42586]: eS9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:56 np0005593102 certmonger[42586]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5 Jan 23 08:05:56 np0005593102 certmonger[42586]: GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:56 np0005593102 certmonger[42586]: BQADggGBAKc17HVyQjz73Xqc323JFnSE3su/AS8rhWYwuOpduBpGu2gTtbZz1OCV Jan 23 08:05:56 np0005593102 certmonger[42586]: ZtOHxrjbYvHsYuqj7xaEm9iUNw9JbynXcmrHHfXpdIiWUMeR3fQTBST3vmIu3sqh Jan 23 08:05:56 np0005593102 certmonger[42586]: p7NFAYPSgKJWq6gsPNMbUoWhVWxZDSNU6IdRcHqmPhvv8vmrNEaNY5e3C68luzR3 Jan 23 08:05:56 np0005593102 certmonger[42586]: oPRj1bYvBACbeMWHKPzit/3QVsmFawGeFT//B5/Imw9g6VGcML40aA5NyeAb4Wh6 Jan 23 08:05:56 np0005593102 certmonger[42586]: y2AXKhUf5XkTE6VllNEnPu3vMUgOEfe+wCHtqTshvoMyKmTrH0WOIDeveFYPOXNS Jan 23 08:05:56 np0005593102 certmonger[42586]: vgrGKZaRjAzbxU0TozHS8ZaX78KsQhgvdfKExEIOsXfvqNKlDDYBHhVwkWZ07UfT Jan 23 08:05:56 np0005593102 certmonger[42586]: 6nhhXXNQxrKvwS5NTcXf1RS5oOzs3Du653PAaLPxPE+IOt+Is+OKb6syVnul3doC Jan 23 08:05:56 np0005593102 certmonger[42586]: SRhV9vg79WcjtJA/h7gorvY76nUuhQwrj0E/cwB9aYWAQUK8p06nhOtToSKHfAY4 Jan 23 08:05:56 np0005593102 certmonger[42586]: a3WQ4eaP4g== Jan 23 08:05:56 np0005593102 certmonger[42586]: -----END CERTIFICATE----- Jan 23 08:05:56 np0005593102 certmonger[42586]: ". Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Certificate submission still ongoing. Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Certificate submission postprocessing complete. Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Child status = 0. Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Child output: Jan 23 08:05:56 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\na3WQ4eaP4g==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:56 np0005593102 certmonger[38898]: " Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:56 np0005593102 certmonger[38898]: MIIFczCCA9ugAwIBAgIRAOtwj5mTOYWYgdn6dCnWPrEwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:56 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:56 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA1NTZaFw0yODAxMjQwODA1NTZaMD8xETAPBgNVBAoM Jan 23 08:05:56 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:05:56 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCkE7tt65VXYjMD Jan 23 08:05:56 np0005593102 certmonger[38898]: wy+bZ40q5Zqfg7VhRARBfKSI83rDsjViXkDyX73F3j2LP15OQBhO0D8TagSX2nhK Jan 23 08:05:56 np0005593102 certmonger[38898]: xElLP/+8Kp9Zu2MOKZum1+DHONtZDZsaS3zaHB1OOSQ5l0VbU/ZvWWspwixP2VXv Jan 23 08:05:56 np0005593102 certmonger[38898]: E8TXTqQKE+nzMiInCBafueMFVopFGt5B8MbeqmVtitJh2aeXPrGXeG5X3WLjApnE Jan 23 08:05:56 np0005593102 certmonger[38898]: bYnrQBCEBZcmUmnaQsWCPLIl29+HJQ26GIgtWFOu1y3hFrlmpdKWUgSSsYu1fHi1 Jan 23 08:05:56 np0005593102 certmonger[38898]: e+kH9zdCGuKxwj1tV6smhKNcQywM6Z/3o7DpX0jSdINY/mXA7hxmUwBhL2dy9ZaB Jan 23 08:05:56 np0005593102 certmonger[38898]: mkfvoWs/AgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:56 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:56 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:56 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:56 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:56 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQc Jan 23 08:05:56 np0005593102 certmonger[38898]: xgW4iiG0JUaA3ssOnMGuhmuNVjCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDIu Jan 23 08:05:56 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94 Jan 23 08:05:56 np0005593102 certmonger[38898]: eS9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:56 np0005593102 certmonger[38898]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5 Jan 23 08:05:56 np0005593102 certmonger[38898]: GyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:56 np0005593102 certmonger[38898]: BQADggGBAKc17HVyQjz73Xqc323JFnSE3su/AS8rhWYwuOpduBpGu2gTtbZz1OCV Jan 23 08:05:56 np0005593102 certmonger[38898]: ZtOHxrjbYvHsYuqj7xaEm9iUNw9JbynXcmrHHfXpdIiWUMeR3fQTBST3vmIu3sqh Jan 23 08:05:56 np0005593102 certmonger[38898]: p7NFAYPSgKJWq6gsPNMbUoWhVWxZDSNU6IdRcHqmPhvv8vmrNEaNY5e3C68luzR3 Jan 23 08:05:56 np0005593102 certmonger[38898]: oPRj1bYvBACbeMWHKPzit/3QVsmFawGeFT//B5/Imw9g6VGcML40aA5NyeAb4Wh6 Jan 23 08:05:56 np0005593102 certmonger[38898]: y2AXKhUf5XkTE6VllNEnPu3vMUgOEfe+wCHtqTshvoMyKmTrH0WOIDeveFYPOXNS Jan 23 08:05:56 np0005593102 certmonger[38898]: vgrGKZaRjAzbxU0TozHS8ZaX78KsQhgvdfKExEIOsXfvqNKlDDYBHhVwkWZ07UfT Jan 23 08:05:56 np0005593102 certmonger[38898]: 6nhhXXNQxrKvwS5NTcXf1RS5oOzs3Du653PAaLPxPE+IOt+Is+OKb6syVnul3doC Jan 23 08:05:56 np0005593102 certmonger[38898]: SRhV9vg79WcjtJA/h7gorvY76nUuhQwrj0E/cwB9aYWAQUK8p06nhOtToSKHfAY4 Jan 23 08:05:56 np0005593102 certmonger[38898]: a3WQ4eaP4g== Jan 23 08:05:56 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:05:56 np0005593102 certmonger[38898]: ". Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] No hooks set for pre-save command. Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:56 np0005593102 certmonger[38898]: 2026-01-23 08:05:56 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:57 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:57 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:57 np0005593102 certmonger[38898]: 2026-01-23 08:05:57 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:57 np0005593102 certmonger[38898]: 2026-01-23 08:05:57 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:57 np0005593102 certmonger[42662]: Certificate in file "/etc/pki/tls/certs/novnc-proxy.crt" issued by CA and saved. Jan 23 08:05:57 np0005593102 certmonger[38898]: 2026-01-23 08:05:57 [38898] Wrote to /var/lib/certmonger/requests/20260123080556 Jan 23 08:05:58 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:58 np0005593102 python3[42678]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:59 np0005593102 python3[42698]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:02 np0005593102 python3[42715]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:06 np0005593102 python3[42732]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:06 np0005593102 python3[42748]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:07 np0005593102 python3[42764]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:06:08 np0005593102 python3[42782]: ansible-certificate_request Invoked with name=ovn_dbs dns=['np0005593102.internalapi.ooo.test'] principal=['ovn_dbs/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Jan 23 08:06:08 np0005593102 certmonger[38898]: 2026-01-23 08:06:08 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:08 np0005593102 certmonger[38898]: 2026-01-23 08:06:08 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:08 np0005593102 certmonger[38898]: 2026-01-23 08:06:08 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:08 np0005593102 certmonger[38898]: 2026-01-23 08:06:08 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:08 np0005593102 certmonger[38898]: 2026-01-23 08:06:08 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:08 np0005593102 certmonger[38898]: 2026-01-23 08:06:08 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:08 np0005593102 certmonger[38898]: 2026-01-23 08:06:08 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:08 np0005593102 certmonger[38898]: 2026-01-23 08:06:08 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:08 np0005593102 certmonger[38898]: 2026-01-23 08:06:08 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:06:09 np0005593102 certmonger[42792]: " for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_dbs/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:06:09 np0005593102 certmonger[42792]: " for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:06:09 np0005593102 certmonger[42792]: MIID2DCCAsACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:06:09 np0005593102 certmonger[42792]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvoTRiEP3 Jan 23 08:06:09 np0005593102 certmonger[42792]: AgEbblxhm0pnfGAYx1mryRQd5fENiV77VKTiJueWltQwsGMXM28F3/qFjVYq1mAl Jan 23 08:06:09 np0005593102 certmonger[42792]: Tb6C2m/0s7n30cLFDb3AZrrqUwJoKRzFDt50Rpg68WUcgmba4D44Y0hetiHJ8kMd Jan 23 08:06:09 np0005593102 certmonger[42792]: ToZ9cC+p7sOJ/JWiU5L+Dt6tSzWxD9zebxll6pw9UfT1XkdwI4tJCbO0pZP9MvBw Jan 23 08:06:09 np0005593102 certmonger[42792]: Q0/wrbekOzyjwCqZTPfAYz4HNXDCCQ8s4CAV2O/e4iO/P4AlsDXElHOo0GqlhrJr Jan 23 08:06:09 np0005593102 certmonger[42792]: XyUWD00IcpLXz1aT4wMJHoRxcQBBxdTpa4TmOqNC77P3RtXpy58WTtSKmHF0yZMf Jan 23 08:06:09 np0005593102 certmonger[42792]: SeovgyLWRTt7lwIDAQABoIIBZTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:06:09 np0005593102 certmonger[42792]: ADIAMwAwADgAMAA2ADAAODCCATQGCSqGSIb3DQEJDjGCASUwggEhMAsGA1UdDwQE Jan 23 08:06:09 np0005593102 certmonger[42792]: AwIFoDCBxQYDVR0RBIG9MIG6giFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:06:09 np0005593102 certmonger[42792]: LnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25wMDAwNTU5MzEwMi5pbnRl Jan 23 08:06:09 np0005593102 certmonger[42792]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEFAgKgRzBFoAobCE9PTy5U Jan 23 08:06:09 np0005593102 certmonger[42792]: RVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1NTkzMTAyLmludGVybmFs Jan 23 08:06:09 np0005593102 certmonger[42792]: YXBpLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNV Jan 23 08:06:09 np0005593102 certmonger[42792]: HRMBAf8EAjAAMB0GA1UdDgQWBBTJgrAtnWdstnN1EylPYupgZYVz6TANBgkqhkiG Jan 23 08:06:09 np0005593102 certmonger[42792]: 9w0BAQsFAAOCAQEAU0HWS3vfD0aB+OUkpFjRtE1VW3UR8t2fwThJsuAiLZi+0L2C Jan 23 08:06:09 np0005593102 certmonger[42792]: c9BEKQE2y5Cxkl6Z2I5McshSTi+JZrUPtKhHAe3Tyh/UMZO99KMfkaY7d89ZuuhY Jan 23 08:06:09 np0005593102 certmonger[42792]: KLvqKJUxy5N3+F2aLj1haOb94uNd41QsXQuN/9arpTQyT7E+DjvZEF+Dsfn3i+DM Jan 23 08:06:09 np0005593102 certmonger[42792]: yE6rw32zKZOWZOketUov406bGgQdtkvZu49BNGugkphJ+DZG1TKBuga171vrwdUq Jan 23 08:06:09 np0005593102 certmonger[42792]: +79fWydwOXJCdvmU2R048v60jQWiIcmoHIex3oXASQMlxplTLmym0JmX3J77pDRH Jan 23 08:06:09 np0005593102 certmonger[42792]: L1i8iMyxVKTye/qn2TbkG+hQBJhZp3erlnztHQ== Jan 23 08:06:09 np0005593102 certmonger[42792]: -----END CERTIFICATE REQUEST----- Jan 23 08:06:09 np0005593102 certmonger[42792]: " for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+hNGIQ/cCARtuXGGbSmd8YBjHWavJFB3l8Q2JXvtUpOIm55aW1DCwYxczbwXf+oWNVirWYCVNvoLab/SzuffRwsUNvcBmuupTAmgpHMUO3nRGmDrxZRyCZtrgPjhjSF62IcnyQx1Ohn1wL6nuw4n8laJTkv4O3q1LNbEP3N5vGWXqnD1R9PVeR3Aji0kJs7Slk/0y8HBDT/Ctt6Q7PKPAKplM98BjPgc1cMIJDyzgIBXY797iI78/gCWwNcSUc6jQaqWGsmtfJRYPTQhyktfPVpPjAwkehHFxAEHF1OlrhOY6o0Lvs/dG1enLnxZO1IqYcXTJkx9J6i+DItZFO3uXAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAGRFrY4W1MV071iEM09QHesAEmJe6WilqPayC/78xb7tXF9jW+hOOuD6E1iY4oME48+97Xod0EB6U/f2/Cg4zzuRV/wjm7+vx8FP1B0EoQgdtWVjB6+HTN1tlONYjMb7VNvxxjo1LVo5xAyLHCy0XA7dBBjcdjlu7nTe3uhXw1c1IixzH8mtcW+kb8uDXsMy3yX3L8o0/35MlSDl9C/0DsK9R7aYpOFUyOiG6BaV8ZkKmKfw1EEml9j8uDfRnWA8zs5wXLtWfmSOJjSnpejyjMH53VI6Pl5r8O9YeHgC40rWwplCPkoxkD2ZVaGOKfHebonlHsylSU89VJvYW7/b59w==" for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvoTRiEP3AgEbblxhm0pnfGAYx1mryRQd5fENiV77VKTiJueWltQwsGMXM28F3/qFjVYq1mAlTb6C2m/0s7n30cLFDb3AZrrqUwJoKRzFDt50Rpg68WUcgmba4D44Y0hetiHJ8kMdToZ9cC+p7sOJ/JWiU5L+Dt6tSzWxD9zebxll6pw9UfT1XkdwI4tJCbO0pZP9MvBwQ0/wrbekOzyjwCqZTPfAYz4HNXDCCQ8s4CAV2O/e4iO/P4AlsDXElHOo0GqlhrJrXyUWD00IcpLXz1aT4wMJHoRxcQBBxdTpa4TmOqNC77P3RtXpy58WTtSKmHF0yZMfSeovgyLWRTt7lwIDAQAB" for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:09 np0005593102 certmonger[42792]: 2026-01-23 08:06:09 [42792] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[42792]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:06:09 np0005593102 certmonger[42792]: Certificate: "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" Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Certificate submission still ongoing. Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Certificate submission attempt complete. Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Child status = 0. Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Child output: Jan 23 08:06:09 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:06:09 np0005593102 certmonger[38898]: MIIFazCCA9OgAwIBAgIRAJu+4lH1uAmzSylS1kWyj4IwDQYJKoZIhvcNAQELBQAw Jan 23 08:06:09 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:06:09 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA2MDlaFw0yODAxMjQwODA2MDlaMD8xETAPBgNVBAoM Jan 23 08:06:09 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:06:09 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+hNGIQ/cCARtu Jan 23 08:06:09 np0005593102 certmonger[38898]: XGGbSmd8YBjHWavJFB3l8Q2JXvtUpOIm55aW1DCwYxczbwXf+oWNVirWYCVNvoLa Jan 23 08:06:09 np0005593102 certmonger[38898]: b/SzuffRwsUNvcBmuupTAmgpHMUO3nRGmDrxZRyCZtrgPjhjSF62IcnyQx1Ohn1w Jan 23 08:06:09 np0005593102 certmonger[38898]: L6nuw4n8laJTkv4O3q1LNbEP3N5vGWXqnD1R9PVeR3Aji0kJs7Slk/0y8HBDT/Ct Jan 23 08:06:09 np0005593102 certmonger[38898]: t6Q7PKPAKplM98BjPgc1cMIJDyzgIBXY797iI78/gCWwNcSUc6jQaqWGsmtfJRYP Jan 23 08:06:09 np0005593102 certmonger[38898]: TQhyktfPVpPjAwkehHFxAEHF1OlrhOY6o0Lvs/dG1enLnxZO1IqYcXTJkx9J6i+D Jan 23 08:06:09 np0005593102 certmonger[38898]: ItZFO3uXAgMBAAGjggHsMIIB6DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:06:09 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:09 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:06:09 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:09 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:06:09 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTv Jan 23 08:06:09 np0005593102 certmonger[38898]: aIeCSWQpAvuoOSgw6xnoF1avMjCBxQYDVR0RBIG9MIG6giFucDAwMDU1OTMxMDIu Jan 23 08:06:09 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25w Jan 23 08:06:09 np0005593102 certmonger[38898]: MDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEF Jan 23 08:06:09 np0005593102 certmonger[38898]: AgKgRzBFoAobCE9PTy5URVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1 Jan 23 08:06:09 np0005593102 certmonger[38898]: NTkzMTAyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQB6 Jan 23 08:06:09 np0005593102 certmonger[38898]: 7OdPzCRZ12PiOBkbslpEAn94TY08WCUADuvE4fFR1SW5wJIgmdaurtaS9ijIqH5y Jan 23 08:06:09 np0005593102 certmonger[38898]: H3rMMb1PDazlA1AmuhOisN6ohrXxG9QNCMYKPBNllwO8FdDeWwbpR967EPwf985F Jan 23 08:06:09 np0005593102 certmonger[38898]: Hg012+uPykBovNBAI9nBS+ROZHQLUZRQW/+E0UPJgcq2ucsvRxV6Ajdg30UE2YT+ Jan 23 08:06:09 np0005593102 certmonger[38898]: sxWKl90Nl+QcRixyBp/0O2c6e2P1LYHsrpOq0+tiAFshkwnYWQa4hViCyg1WWDry Jan 23 08:06:09 np0005593102 certmonger[38898]: gsTRjFABGI64yR1Vkw4XgihbKQ4DjkkEmJ9bB1XNC4TvWkM9KVqXA7T3QgTegew7 Jan 23 08:06:09 np0005593102 certmonger[38898]: 1FWSVi/MoG1+I7oJseA8+fqFoXATeTllly9v7AHJ2h5ahDKE9zc5HBMhNczj5/E3 Jan 23 08:06:09 np0005593102 certmonger[38898]: J2AyvUKWz2LvsXGFuGheUAlRQQstqbEtdyu8VWbzQfo1JBFOPgJRPnMcjXqyJJRH Jan 23 08:06:09 np0005593102 certmonger[38898]: HEbzTuljscEvyXyLi3Y+11HTlI5RJQ1zxfcY6qWX5wuRDal1v4a4jXYkBuXPxyM= Jan 23 08:06:09 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:06:09 np0005593102 certmonger[38898]: " Jan 23 08:06:09 np0005593102 certmonger[42794]: 2026-01-23 08:06:09 [42794] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:06:09 np0005593102 certmonger[42794]: MIIFazCCA9OgAwIBAgIRAJu+4lH1uAmzSylS1kWyj4IwDQYJKoZIhvcNAQELBQAw Jan 23 08:06:09 np0005593102 certmonger[42794]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:06:09 np0005593102 certmonger[42794]: cml0eTAeFw0yNjAxMjMwODA2MDlaFw0yODAxMjQwODA2MDlaMD8xETAPBgNVBAoM Jan 23 08:06:09 np0005593102 certmonger[42794]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:06:09 np0005593102 certmonger[42794]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+hNGIQ/cCARtu Jan 23 08:06:09 np0005593102 certmonger[42794]: XGGbSmd8YBjHWavJFB3l8Q2JXvtUpOIm55aW1DCwYxczbwXf+oWNVirWYCVNvoLa Jan 23 08:06:09 np0005593102 certmonger[42794]: b/SzuffRwsUNvcBmuupTAmgpHMUO3nRGmDrxZRyCZtrgPjhjSF62IcnyQx1Ohn1w Jan 23 08:06:09 np0005593102 certmonger[42794]: L6nuw4n8laJTkv4O3q1LNbEP3N5vGWXqnD1R9PVeR3Aji0kJs7Slk/0y8HBDT/Ct Jan 23 08:06:09 np0005593102 certmonger[42794]: t6Q7PKPAKplM98BjPgc1cMIJDyzgIBXY797iI78/gCWwNcSUc6jQaqWGsmtfJRYP Jan 23 08:06:09 np0005593102 certmonger[42794]: TQhyktfPVpPjAwkehHFxAEHF1OlrhOY6o0Lvs/dG1enLnxZO1IqYcXTJkx9J6i+D Jan 23 08:06:09 np0005593102 certmonger[42794]: ItZFO3uXAgMBAAGjggHsMIIB6DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:06:09 np0005593102 certmonger[42794]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:09 np0005593102 certmonger[42794]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:06:09 np0005593102 certmonger[42794]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:09 np0005593102 certmonger[42794]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:06:09 np0005593102 certmonger[42794]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTv Jan 23 08:06:09 np0005593102 certmonger[42794]: aIeCSWQpAvuoOSgw6xnoF1avMjCBxQYDVR0RBIG9MIG6giFucDAwMDU1OTMxMDIu Jan 23 08:06:09 np0005593102 certmonger[42794]: aW50ZXJuYWxhcGkub29vLnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25w Jan 23 08:06:09 np0005593102 certmonger[42794]: MDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEF Jan 23 08:06:09 np0005593102 certmonger[42794]: AgKgRzBFoAobCE9PTy5URVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1 Jan 23 08:06:09 np0005593102 certmonger[42794]: NTkzMTAyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQB6 Jan 23 08:06:09 np0005593102 certmonger[42794]: 7OdPzCRZ12PiOBkbslpEAn94TY08WCUADuvE4fFR1SW5wJIgmdaurtaS9ijIqH5y Jan 23 08:06:09 np0005593102 certmonger[42794]: H3rMMb1PDazlA1AmuhOisN6ohrXxG9QNCMYKPBNllwO8FdDeWwbpR967EPwf985F Jan 23 08:06:09 np0005593102 certmonger[42794]: Hg012+uPykBovNBAI9nBS+ROZHQLUZRQW/+E0UPJgcq2ucsvRxV6Ajdg30UE2YT+ Jan 23 08:06:09 np0005593102 certmonger[42794]: sxWKl90Nl+QcRixyBp/0O2c6e2P1LYHsrpOq0+tiAFshkwnYWQa4hViCyg1WWDry Jan 23 08:06:09 np0005593102 certmonger[42794]: gsTRjFABGI64yR1Vkw4XgihbKQ4DjkkEmJ9bB1XNC4TvWkM9KVqXA7T3QgTegew7 Jan 23 08:06:09 np0005593102 certmonger[42794]: 1FWSVi/MoG1+I7oJseA8+fqFoXATeTllly9v7AHJ2h5ahDKE9zc5HBMhNczj5/E3 Jan 23 08:06:09 np0005593102 certmonger[42794]: J2AyvUKWz2LvsXGFuGheUAlRQQstqbEtdyu8VWbzQfo1JBFOPgJRPnMcjXqyJJRH Jan 23 08:06:09 np0005593102 certmonger[42794]: HEbzTuljscEvyXyLi3Y+11HTlI5RJQ1zxfcY6qWX5wuRDal1v4a4jXYkBuXPxyM= Jan 23 08:06:09 np0005593102 certmonger[42794]: -----END CERTIFICATE----- Jan 23 08:06:09 np0005593102 certmonger[42794]: ". Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Certificate submission still ongoing. Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Certificate submission postprocessing complete. Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Child status = 0. Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Child output: Jan 23 08:06:09 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:06:09 np0005593102 certmonger[38898]: " Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:06:09 np0005593102 certmonger[38898]: MIIFazCCA9OgAwIBAgIRAJu+4lH1uAmzSylS1kWyj4IwDQYJKoZIhvcNAQELBQAw Jan 23 08:06:09 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:06:09 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA2MDlaFw0yODAxMjQwODA2MDlaMD8xETAPBgNVBAoM Jan 23 08:06:09 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:06:09 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+hNGIQ/cCARtu Jan 23 08:06:09 np0005593102 certmonger[38898]: XGGbSmd8YBjHWavJFB3l8Q2JXvtUpOIm55aW1DCwYxczbwXf+oWNVirWYCVNvoLa Jan 23 08:06:09 np0005593102 certmonger[38898]: b/SzuffRwsUNvcBmuupTAmgpHMUO3nRGmDrxZRyCZtrgPjhjSF62IcnyQx1Ohn1w Jan 23 08:06:09 np0005593102 certmonger[38898]: L6nuw4n8laJTkv4O3q1LNbEP3N5vGWXqnD1R9PVeR3Aji0kJs7Slk/0y8HBDT/Ct Jan 23 08:06:09 np0005593102 certmonger[38898]: t6Q7PKPAKplM98BjPgc1cMIJDyzgIBXY797iI78/gCWwNcSUc6jQaqWGsmtfJRYP Jan 23 08:06:09 np0005593102 certmonger[38898]: TQhyktfPVpPjAwkehHFxAEHF1OlrhOY6o0Lvs/dG1enLnxZO1IqYcXTJkx9J6i+D Jan 23 08:06:09 np0005593102 certmonger[38898]: ItZFO3uXAgMBAAGjggHsMIIB6DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:06:09 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:09 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:06:09 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:09 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:06:09 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTv Jan 23 08:06:09 np0005593102 certmonger[38898]: aIeCSWQpAvuoOSgw6xnoF1avMjCBxQYDVR0RBIG9MIG6giFucDAwMDU1OTMxMDIu Jan 23 08:06:09 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25w Jan 23 08:06:09 np0005593102 certmonger[38898]: MDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEF Jan 23 08:06:09 np0005593102 certmonger[38898]: AgKgRzBFoAobCE9PTy5URVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1 Jan 23 08:06:09 np0005593102 certmonger[38898]: NTkzMTAyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQB6 Jan 23 08:06:09 np0005593102 certmonger[38898]: 7OdPzCRZ12PiOBkbslpEAn94TY08WCUADuvE4fFR1SW5wJIgmdaurtaS9ijIqH5y Jan 23 08:06:09 np0005593102 certmonger[38898]: H3rMMb1PDazlA1AmuhOisN6ohrXxG9QNCMYKPBNllwO8FdDeWwbpR967EPwf985F Jan 23 08:06:09 np0005593102 certmonger[38898]: Hg012+uPykBovNBAI9nBS+ROZHQLUZRQW/+E0UPJgcq2ucsvRxV6Ajdg30UE2YT+ Jan 23 08:06:09 np0005593102 certmonger[38898]: sxWKl90Nl+QcRixyBp/0O2c6e2P1LYHsrpOq0+tiAFshkwnYWQa4hViCyg1WWDry Jan 23 08:06:09 np0005593102 certmonger[38898]: gsTRjFABGI64yR1Vkw4XgihbKQ4DjkkEmJ9bB1XNC4TvWkM9KVqXA7T3QgTegew7 Jan 23 08:06:09 np0005593102 certmonger[38898]: 1FWSVi/MoG1+I7oJseA8+fqFoXATeTllly9v7AHJ2h5ahDKE9zc5HBMhNczj5/E3 Jan 23 08:06:09 np0005593102 certmonger[38898]: J2AyvUKWz2LvsXGFuGheUAlRQQstqbEtdyu8VWbzQfo1JBFOPgJRPnMcjXqyJJRH Jan 23 08:06:09 np0005593102 certmonger[38898]: HEbzTuljscEvyXyLi3Y+11HTlI5RJQ1zxfcY6qWX5wuRDal1v4a4jXYkBuXPxyM= Jan 23 08:06:09 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:06:09 np0005593102 certmonger[38898]: ". Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] No hooks set for pre-save command. Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] No hooks set for post-save command. Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:09 np0005593102 certmonger[42798]: Certificate in file "/etc/pki/tls/certs/ovn_dbs.crt" issued by CA and saved. Jan 23 08:06:09 np0005593102 certmonger[38898]: 2026-01-23 08:06:09 [38898] Wrote to /var/lib/certmonger/requests/20260123080608 Jan 23 08:06:10 np0005593102 python3[42814]: ansible-ansible.builtin.file Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig recurse=True state=directory selevel=s0 setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 08:06:11 np0005593102 python3[42830]: ansible-ansible.legacy.command Invoked with _raw_params=ovsdb-tool --help|grep -q election-timer _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:12 np0005593102 python3[42881]: ansible-ansible.legacy.stat Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 08:06:12 np0005593102 python3[42924]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155571.5220377-110650-131271042475454/source dest=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster mode=640 selevel=s0 setype=container_file_t follow=False _original_basename=ovn_cluster.j2 checksum=f4d8671d476cc2555758c3bbeadd2374b6f70920 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None attributes=None Jan 23 08:06:13 np0005593102 sshd[42955]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:06:13 np0005593102 python3[42954]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_north_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:13 np0005593102 python3[42973]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_south_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:14 np0005593102 python3[42990]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_northd _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:14 np0005593102 python3[43007]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:06:15 np0005593102 python3[43027]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:18 np0005593102 python3[43044]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:21 np0005593102 python3[43061]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:22 np0005593102 python3[43077]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:22 np0005593102 python3[43093]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:06:23 np0005593102 python3[43111]: ansible-certificate_request Invoked with name=ovn_controller dns=['np0005593102.internalapi.ooo.test'] principal=['ovn_controller/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:06:23 np0005593102 certmonger[43121]: " for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_controller/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:06:23 np0005593102 certmonger[43121]: " for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:06:23 np0005593102 certmonger[43121]: MIID5jCCAs4CAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:06:23 np0005593102 certmonger[43121]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApTLD3NWT Jan 23 08:06:23 np0005593102 certmonger[43121]: MEISeF7yk4D5XjDtWkgRI82aGalhSNZyxYl7LTZtCdXkJNeSiXkpC202Ji7Relg+ Jan 23 08:06:23 np0005593102 certmonger[43121]: dXKWsbcojYwKADt0r0XjPKcn3w5NpoJXl8qhTx0piIvE9l56zqZJFtz7lUeR6ZT4 Jan 23 08:06:23 np0005593102 certmonger[43121]: vHMSctsR9VehdTLGAWAGzatmzHkQH8JyXaCmf2Ce5whQmuRN4UY/FqCKol/6PaXJ Jan 23 08:06:23 np0005593102 certmonger[43121]: DyonxN2V5OBr+CQna1F3eoEMCr3AWM9gq7QQyrG02MvvLJnmg8jRCj6zzYcToEe/ Jan 23 08:06:23 np0005593102 certmonger[43121]: 13lBSZ2pyrx7RsblJfu+U9Tsr+N4OMJTXrfbQ9HwVjoW6pe0KZFp6vfIzFocoOfH Jan 23 08:06:23 np0005593102 certmonger[43121]: 0pUFsDxP8vUgBQIDAQABoIIBczArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:06:23 np0005593102 certmonger[43121]: ADIAMwAwADgAMAA2ADIAMzCCAUIGCSqGSIb3DQEJDjGCATMwggEvMAsGA1UdDwQE Jan 23 08:06:23 np0005593102 certmonger[43121]: AwIFoDCB0wYDVR0RBIHLMIHIgiFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:06:23 np0005593102 certmonger[43121]: LnRlc3SgSQYKKwYBBAGCNxQCA6A7DDlvdm5fY29udHJvbGxlci9ucDAwMDU1OTMx Jan 23 08:06:23 np0005593102 certmonger[43121]: MDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgWAYGKwYBBQICoE4wTKAK Jan 23 08:06:23 np0005593102 certmonger[43121]: GwhPT08uVEVTVKE+MDygAwIBAaE1MDMbDm92bl9jb250cm9sbGVyGyFucDAwMDU1 Jan 23 08:06:23 np0005593102 certmonger[43121]: OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEG Jan 23 08:06:23 np0005593102 certmonger[43121]: CCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFMNJa9m44lyUZcMZ+Fuu Jan 23 08:06:23 np0005593102 certmonger[43121]: p6hfkPVLMA0GCSqGSIb3DQEBCwUAA4IBAQA9+xqAOnWu3+mQCgU4K5mUYj9rJC08 Jan 23 08:06:23 np0005593102 certmonger[43121]: CuARoxvgiLJBCsdmehTxIsTcdWFKyDjReBuEXA6G5su/DFu2kx2h3NGLY0nSKqVD Jan 23 08:06:23 np0005593102 certmonger[43121]: ZodLM/+2FfYg6GTBSGOV+OeruO4P2YpH+VBARlqjEat7pSU3krh3OU7DOKd5d+fk Jan 23 08:06:23 np0005593102 certmonger[43121]: mEBIRFnFdgjQQig0ufbUG+xVsHl6ZrgAcqcUBwTn5dBvLriPHhC+Qjp8PKKtVPXN Jan 23 08:06:23 np0005593102 certmonger[43121]: Cxx3d2Hx2HQAoLf6+7SrWOjDhu8jW6ixGbeteKH7tvzdKQZd76bhpbVxPg21HcOz Jan 23 08:06:23 np0005593102 certmonger[43121]: t3l1eEfgdW96H9tXs6/Gx/QK//Mh0KWySpvlMPH4a8lf+DQFz/Gupuq7 Jan 23 08:06:23 np0005593102 certmonger[43121]: -----END CERTIFICATE REQUEST----- Jan 23 08:06:23 np0005593102 certmonger[43121]: " for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApTLD3NWTMEISeF7yk4D5XjDtWkgRI82aGalhSNZyxYl7LTZtCdXkJNeSiXkpC202Ji7Relg+dXKWsbcojYwKADt0r0XjPKcn3w5NpoJXl8qhTx0piIvE9l56zqZJFtz7lUeR6ZT4vHMSctsR9VehdTLGAWAGzatmzHkQH8JyXaCmf2Ce5whQmuRN4UY/FqCKol/6PaXJDyonxN2V5OBr+CQna1F3eoEMCr3AWM9gq7QQyrG02MvvLJnmg8jRCj6zzYcToEe/13lBSZ2pyrx7RsblJfu+U9Tsr+N4OMJTXrfbQ9HwVjoW6pe0KZFp6vfIzFocoOfH0pUFsDxP8vUgBQIDAQAB" for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:23 np0005593102 certmonger[43121]: 2026-01-23 08:06:23 [43121] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:23 np0005593102 certmonger[38898]: 2026-01-23 08:06:23 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:23 np0005593102 certmonger[43121]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:06:24 np0005593102 certmonger[43121]: Certificate: "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" Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Certificate submission still ongoing. Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Certificate submission attempt complete. Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Child status = 0. Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Child output: Jan 23 08:06:24 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:06:24 np0005593102 certmonger[38898]: MIIFeTCCA+GgAwIBAgIRAIa5ntMftJGJrQTDYa9riVcwDQYJKoZIhvcNAQELBQAw Jan 23 08:06:24 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:06:24 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA2MjRaFw0yODAxMjQwODA2MjRaMD8xETAPBgNVBAoM Jan 23 08:06:24 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:06:24 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQClMsPc1ZMwQhJ4 Jan 23 08:06:24 np0005593102 certmonger[38898]: XvKTgPleMO1aSBEjzZoZqWFI1nLFiXstNm0J1eQk15KJeSkLbTYmLtF6WD51cpax Jan 23 08:06:24 np0005593102 certmonger[38898]: tyiNjAoAO3SvReM8pyffDk2mgleXyqFPHSmIi8T2XnrOpkkW3PuVR5HplPi8cxJy Jan 23 08:06:24 np0005593102 certmonger[38898]: 2xH1V6F1MsYBYAbNq2bMeRAfwnJdoKZ/YJ7nCFCa5E3hRj8WoIqiX/o9pckPKifE Jan 23 08:06:24 np0005593102 certmonger[38898]: 3ZXk4Gv4JCdrUXd6gQwKvcBYz2CrtBDKsbTYy+8smeaDyNEKPrPNhxOgR7/XeUFJ Jan 23 08:06:24 np0005593102 certmonger[38898]: nanKvHtGxuUl+75T1Oyv43g4wlNet9tD0fBWOhbql7QpkWnq98jMWhyg58fSlQWw Jan 23 08:06:24 np0005593102 certmonger[38898]: PE/y9SAFAgMBAAGjggH6MIIB9jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:06:24 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:24 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:06:24 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:24 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:06:24 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTe Jan 23 08:06:24 np0005593102 certmonger[38898]: LPRb7ZTKUYebaSxqb914RzgaUTCB0wYDVR0RBIHLMIHIgiFucDAwMDU1OTMxMDIu Jan 23 08:06:24 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgSQYKKwYBBAGCNxQCA6A7DDlvdm5fY29udHJv Jan 23 08:06:24 np0005593102 certmonger[38898]: bGxlci9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1Sg Jan 23 08:06:24 np0005593102 certmonger[38898]: WAYGKwYBBQICoE4wTKAKGwhPT08uVEVTVKE+MDygAwIBAaE1MDMbDm92bl9jb250 Jan 23 08:06:24 np0005593102 certmonger[38898]: cm9sbGVyGyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZI Jan 23 08:06:24 np0005593102 certmonger[38898]: hvcNAQELBQADggGBAFdxgC6PxO/hB1E3a4BNHs2LL4ysPawvsHHxVf0brQNgNqtd Jan 23 08:06:24 np0005593102 certmonger[38898]: v6N2ZcCGjdoc0+VJbywRTsYpBVfWyGpJn2pnNugoWgwpPdMasBhgnrz12SXPlMvM Jan 23 08:06:24 np0005593102 certmonger[38898]: YTgopq8V+/NzXQj/Btp/8eKc3YewF1VQCcXEQVj7qHLLcjwHn/zqrEB4BaSEvGiZ Jan 23 08:06:24 np0005593102 certmonger[38898]: fA0Pry/KBHqaNh/lriM/ipZI37SiFGxQbNjGABAO0rQJDLHDFfPT4On9O8EMpZ9N Jan 23 08:06:24 np0005593102 certmonger[38898]: Ob1seC5R3tuwoiRWiV3ybh9vGrhF+rxsxcJum5zz+qbgJuOEcw3tqwnxQGx+7vuo Jan 23 08:06:24 np0005593102 certmonger[38898]: tFxNaEXEyp3agP5TNlZyAwTKCnJTFeBELYFlfzk/dmteBU+/fRXNG3MDDptnjTqX Jan 23 08:06:24 np0005593102 certmonger[38898]: 1ikM95F5x+fXznRo1zrvYKMKX1cBKUX2WHH2ou8FO9VCDsmnYb1CTqEseUjpNLlf Jan 23 08:06:24 np0005593102 certmonger[38898]: 2X0Ln4jKf33ycWukZhvKsHeRlciJDV91KSBSIzXcuS2qIZ6dS/3GfgIqz7Pztcjr Jan 23 08:06:24 np0005593102 certmonger[38898]: LH3XMH8NJvFRgbYjmg== Jan 23 08:06:24 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:06:24 np0005593102 certmonger[38898]: " Jan 23 08:06:24 np0005593102 certmonger[43123]: 2026-01-23 08:06:24 [43123] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:06:24 np0005593102 certmonger[43123]: MIIFeTCCA+GgAwIBAgIRAIa5ntMftJGJrQTDYa9riVcwDQYJKoZIhvcNAQELBQAw Jan 23 08:06:24 np0005593102 certmonger[43123]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:06:24 np0005593102 certmonger[43123]: cml0eTAeFw0yNjAxMjMwODA2MjRaFw0yODAxMjQwODA2MjRaMD8xETAPBgNVBAoM Jan 23 08:06:24 np0005593102 certmonger[43123]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:06:24 np0005593102 certmonger[43123]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQClMsPc1ZMwQhJ4 Jan 23 08:06:24 np0005593102 certmonger[43123]: XvKTgPleMO1aSBEjzZoZqWFI1nLFiXstNm0J1eQk15KJeSkLbTYmLtF6WD51cpax Jan 23 08:06:24 np0005593102 certmonger[43123]: tyiNjAoAO3SvReM8pyffDk2mgleXyqFPHSmIi8T2XnrOpkkW3PuVR5HplPi8cxJy Jan 23 08:06:24 np0005593102 certmonger[43123]: 2xH1V6F1MsYBYAbNq2bMeRAfwnJdoKZ/YJ7nCFCa5E3hRj8WoIqiX/o9pckPKifE Jan 23 08:06:24 np0005593102 certmonger[43123]: 3ZXk4Gv4JCdrUXd6gQwKvcBYz2CrtBDKsbTYy+8smeaDyNEKPrPNhxOgR7/XeUFJ Jan 23 08:06:24 np0005593102 certmonger[43123]: nanKvHtGxuUl+75T1Oyv43g4wlNet9tD0fBWOhbql7QpkWnq98jMWhyg58fSlQWw Jan 23 08:06:24 np0005593102 certmonger[43123]: PE/y9SAFAgMBAAGjggH6MIIB9jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:06:24 np0005593102 certmonger[43123]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:24 np0005593102 certmonger[43123]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:06:24 np0005593102 certmonger[43123]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:24 np0005593102 certmonger[43123]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:06:24 np0005593102 certmonger[43123]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTe Jan 23 08:06:24 np0005593102 certmonger[43123]: LPRb7ZTKUYebaSxqb914RzgaUTCB0wYDVR0RBIHLMIHIgiFucDAwMDU1OTMxMDIu Jan 23 08:06:24 np0005593102 certmonger[43123]: aW50ZXJuYWxhcGkub29vLnRlc3SgSQYKKwYBBAGCNxQCA6A7DDlvdm5fY29udHJv Jan 23 08:06:24 np0005593102 certmonger[43123]: bGxlci9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1Sg Jan 23 08:06:24 np0005593102 certmonger[43123]: WAYGKwYBBQICoE4wTKAKGwhPT08uVEVTVKE+MDygAwIBAaE1MDMbDm92bl9jb250 Jan 23 08:06:24 np0005593102 certmonger[43123]: cm9sbGVyGyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZI Jan 23 08:06:24 np0005593102 certmonger[43123]: hvcNAQELBQADggGBAFdxgC6PxO/hB1E3a4BNHs2LL4ysPawvsHHxVf0brQNgNqtd Jan 23 08:06:24 np0005593102 certmonger[43123]: v6N2ZcCGjdoc0+VJbywRTsYpBVfWyGpJn2pnNugoWgwpPdMasBhgnrz12SXPlMvM Jan 23 08:06:24 np0005593102 certmonger[43123]: YTgopq8V+/NzXQj/Btp/8eKc3YewF1VQCcXEQVj7qHLLcjwHn/zqrEB4BaSEvGiZ Jan 23 08:06:24 np0005593102 certmonger[43123]: fA0Pry/KBHqaNh/lriM/ipZI37SiFGxQbNjGABAO0rQJDLHDFfPT4On9O8EMpZ9N Jan 23 08:06:24 np0005593102 certmonger[43123]: Ob1seC5R3tuwoiRWiV3ybh9vGrhF+rxsxcJum5zz+qbgJuOEcw3tqwnxQGx+7vuo Jan 23 08:06:24 np0005593102 certmonger[43123]: tFxNaEXEyp3agP5TNlZyAwTKCnJTFeBELYFlfzk/dmteBU+/fRXNG3MDDptnjTqX Jan 23 08:06:24 np0005593102 certmonger[43123]: 1ikM95F5x+fXznRo1zrvYKMKX1cBKUX2WHH2ou8FO9VCDsmnYb1CTqEseUjpNLlf Jan 23 08:06:24 np0005593102 certmonger[43123]: 2X0Ln4jKf33ycWukZhvKsHeRlciJDV91KSBSIzXcuS2qIZ6dS/3GfgIqz7Pztcjr Jan 23 08:06:24 np0005593102 certmonger[43123]: LH3XMH8NJvFRgbYjmg== Jan 23 08:06:24 np0005593102 certmonger[43123]: -----END CERTIFICATE----- Jan 23 08:06:24 np0005593102 certmonger[43123]: ". Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Certificate submission still ongoing. Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Certificate submission postprocessing complete. Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Child status = 0. Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Child output: Jan 23 08:06:24 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nLH3XMH8NJvFRgbYjmg==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:06:24 np0005593102 certmonger[38898]: " Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:06:24 np0005593102 certmonger[38898]: MIIFeTCCA+GgAwIBAgIRAIa5ntMftJGJrQTDYa9riVcwDQYJKoZIhvcNAQELBQAw Jan 23 08:06:24 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:06:24 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA2MjRaFw0yODAxMjQwODA2MjRaMD8xETAPBgNVBAoM Jan 23 08:06:24 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:06:24 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQClMsPc1ZMwQhJ4 Jan 23 08:06:24 np0005593102 certmonger[38898]: XvKTgPleMO1aSBEjzZoZqWFI1nLFiXstNm0J1eQk15KJeSkLbTYmLtF6WD51cpax Jan 23 08:06:24 np0005593102 certmonger[38898]: tyiNjAoAO3SvReM8pyffDk2mgleXyqFPHSmIi8T2XnrOpkkW3PuVR5HplPi8cxJy Jan 23 08:06:24 np0005593102 certmonger[38898]: 2xH1V6F1MsYBYAbNq2bMeRAfwnJdoKZ/YJ7nCFCa5E3hRj8WoIqiX/o9pckPKifE Jan 23 08:06:24 np0005593102 certmonger[38898]: 3ZXk4Gv4JCdrUXd6gQwKvcBYz2CrtBDKsbTYy+8smeaDyNEKPrPNhxOgR7/XeUFJ Jan 23 08:06:24 np0005593102 certmonger[38898]: nanKvHtGxuUl+75T1Oyv43g4wlNet9tD0fBWOhbql7QpkWnq98jMWhyg58fSlQWw Jan 23 08:06:24 np0005593102 certmonger[38898]: PE/y9SAFAgMBAAGjggH6MIIB9jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:06:24 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:24 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:06:24 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:06:24 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:06:24 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTe Jan 23 08:06:24 np0005593102 certmonger[38898]: LPRb7ZTKUYebaSxqb914RzgaUTCB0wYDVR0RBIHLMIHIgiFucDAwMDU1OTMxMDIu Jan 23 08:06:24 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SgSQYKKwYBBAGCNxQCA6A7DDlvdm5fY29udHJv Jan 23 08:06:24 np0005593102 certmonger[38898]: bGxlci9ucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1Sg Jan 23 08:06:24 np0005593102 certmonger[38898]: WAYGKwYBBQICoE4wTKAKGwhPT08uVEVTVKE+MDygAwIBAaE1MDMbDm92bl9jb250 Jan 23 08:06:24 np0005593102 certmonger[38898]: cm9sbGVyGyFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZI Jan 23 08:06:24 np0005593102 certmonger[38898]: hvcNAQELBQADggGBAFdxgC6PxO/hB1E3a4BNHs2LL4ysPawvsHHxVf0brQNgNqtd Jan 23 08:06:24 np0005593102 certmonger[38898]: v6N2ZcCGjdoc0+VJbywRTsYpBVfWyGpJn2pnNugoWgwpPdMasBhgnrz12SXPlMvM Jan 23 08:06:24 np0005593102 certmonger[38898]: YTgopq8V+/NzXQj/Btp/8eKc3YewF1VQCcXEQVj7qHLLcjwHn/zqrEB4BaSEvGiZ Jan 23 08:06:24 np0005593102 certmonger[38898]: fA0Pry/KBHqaNh/lriM/ipZI37SiFGxQbNjGABAO0rQJDLHDFfPT4On9O8EMpZ9N Jan 23 08:06:24 np0005593102 certmonger[38898]: Ob1seC5R3tuwoiRWiV3ybh9vGrhF+rxsxcJum5zz+qbgJuOEcw3tqwnxQGx+7vuo Jan 23 08:06:24 np0005593102 certmonger[38898]: tFxNaEXEyp3agP5TNlZyAwTKCnJTFeBELYFlfzk/dmteBU+/fRXNG3MDDptnjTqX Jan 23 08:06:24 np0005593102 certmonger[38898]: 1ikM95F5x+fXznRo1zrvYKMKX1cBKUX2WHH2ou8FO9VCDsmnYb1CTqEseUjpNLlf Jan 23 08:06:24 np0005593102 certmonger[38898]: 2X0Ln4jKf33ycWukZhvKsHeRlciJDV91KSBSIzXcuS2qIZ6dS/3GfgIqz7Pztcjr Jan 23 08:06:24 np0005593102 certmonger[38898]: LH3XMH8NJvFRgbYjmg== Jan 23 08:06:24 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:06:24 np0005593102 certmonger[38898]: ". Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] No hooks set for pre-save command. Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] No hooks set for post-save command. Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 certmonger[43127]: Certificate in file "/etc/pki/tls/certs/ovn_controller.crt" issued by CA and saved. Jan 23 08:06:24 np0005593102 certmonger[38898]: 2026-01-23 08:06:24 [38898] Wrote to /var/lib/certmonger/requests/20260123080623 Jan 23 08:06:24 np0005593102 python3[43143]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:06:25 np0005593102 python3[43163]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:28 np0005593102 python3[43180]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:31 np0005593102 python3[43197]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:32 np0005593102 python3[43213]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:32 np0005593102 python3[43229]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:06:33 np0005593102 python3[43247]: ansible-certificate_request Invoked with name=rabbitmq dns=['np0005593102.internalapi.ooo.test'] principal=['rabbitmq/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'rabbitmq(-bundle-.*-[0-9]+)?')#012service_crt="/etc/pki/tls/certs/rabbitmq.crt"#012service_key="/etc/pki/tls/private/rabbitmq.key"#012if echo "$container_name" | grep -q "^rabbitmq-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_crt" "$service_key" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the cert at the mount-point#012 podman cp $service_crt "$container_name:/var/lib/kolla/config_files/src-tls/$service_crt"#012 # Refresh the key at the mount-point#012 podman cp $service_key "$container_name:/var/lib/kolla/config_files/src-tls/$service_key"#012 # Copy the new cert from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012 # Copy the new key from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012fi#012# Set appropriate permissions#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_crt"#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_key"#012# Trigger a pem cache clear in RabbitMQ to read the new certificates#012podman exec "$container_name" rabbitmqctl eval "ssl:clear_pem_cache()."#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:33 np0005593102 certmonger[38898]: 2026-01-23 08:06:33 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:06:34 np0005593102 certmonger[43257]: " for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_REQ_PRINCIPAL" to "rabbitmq/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:06:34 np0005593102 certmonger[43257]: " for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:06:34 np0005593102 certmonger[43257]: MIID2jCCAsICAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:06:34 np0005593102 certmonger[43257]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwQWZ3f91 Jan 23 08:06:34 np0005593102 certmonger[43257]: Ole83hlShO6iC1u2a/kl3YUqtYr1qAq33y00BiW13ZZ7JxLdfQCtVuvefKzIelet Jan 23 08:06:34 np0005593102 certmonger[43257]: Vg/ekhgDydNo/rI4bNTatySptTQ+GS4+TNvf1lWLO+C6cAbO4T7uxRqBaH55P1p8 Jan 23 08:06:34 np0005593102 certmonger[43257]: bint8r5GEyIqTsvV/eb+DhV33IAzdgshVabMC68DSNZ3NXKgn21nCD5bDkX34iQP Jan 23 08:06:34 np0005593102 certmonger[43257]: /tVYJVpklIXU1fvCrC4uQxxRhGzUu6c99784QvirnKldsBpbKsnzP5JKZJm/3ZUS Jan 23 08:06:34 np0005593102 certmonger[43257]: DwcAF2+EXx2MGUyUBxPexyJB7DnOJEova9oJl/1Q48VOrepGuAMFqi8d0WmdFjMy Jan 23 08:06:34 np0005593102 certmonger[43257]: p2p7iHsyS2BIVwIDAQABoIIBZzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:06:34 np0005593102 certmonger[43257]: ADIAMwAwADgAMAA2ADMAMzCCATYGCSqGSIb3DQEJDjGCAScwggEjMAsGA1UdDwQE Jan 23 08:06:34 np0005593102 certmonger[43257]: AwIFoDCBxwYDVR0RBIG/MIG8giFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:06:34 np0005593102 certmonger[43257]: LnRlc3SgQwYKKwYBBAGCNxQCA6A1DDNyYWJiaXRtcS9ucDAwMDU1OTMxMDIuaW50 Jan 23 08:06:34 np0005593102 certmonger[43257]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUgYGKwYBBQICoEgwRqAKGwhPT08u Jan 23 08:06:34 np0005593102 certmonger[43257]: VEVTVKE4MDagAwIBAaEvMC0bCHJhYmJpdG1xGyFucDAwMDU1OTMxMDIuaW50ZXJu Jan 23 08:06:34 np0005593102 certmonger[43257]: YWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwG Jan 23 08:06:34 np0005593102 certmonger[43257]: A1UdEwEB/wQCMAAwHQYDVR0OBBYEFL5OR7Kxr/oD2wKjwbNw7dEVRnfMMA0GCSqG Jan 23 08:06:34 np0005593102 certmonger[43257]: SIb3DQEBCwUAA4IBAQA8DOKyPZJZi1PuBOPdI7jJcGJayCLfwLN0CGmZlaOGjCJo Jan 23 08:06:34 np0005593102 certmonger[43257]: pdbWRQDGczD4aJs7onma7qnUpxz5QALYotkdx2UvCT3gVdrLaEYPh0meoC4n/6mG Jan 23 08:06:34 np0005593102 certmonger[43257]: 16TNdmuinDmirpAuqAA5ZgnwiyScMjyvHFW45ImIGH4EpnOx/5SADwMBRK3m+QGR Jan 23 08:06:34 np0005593102 certmonger[43257]: oAyI3ALR7KETp06BkefqnVgXXS20CBqmQ8pI+cRw+X78rdBezQ+13027d4i1G+iB Jan 23 08:06:34 np0005593102 certmonger[43257]: oxkFmCgm8zDs7PsvD21mCDRsz9L1wCwF1hG7K6mSjIrvduQFewGQHR7XPsivM+PX Jan 23 08:06:34 np0005593102 certmonger[43257]: aktdQ6syf8M1ziJLBTl3+aErocl3rC0w8q8e0a/h Jan 23 08:06:34 np0005593102 certmonger[43257]: -----END CERTIFICATE REQUEST----- Jan 23 08:06:34 np0005593102 certmonger[43257]: " for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwQWZ3f91Ole83hlShO6iC1u2a/kl3YUqtYr1qAq33y00BiW13ZZ7JxLdfQCtVuvefKzIeletVg/ekhgDydNo/rI4bNTatySptTQ+GS4+TNvf1lWLO+C6cAbO4T7uxRqBaH55P1p8bint8r5GEyIqTsvV/eb+DhV33IAzdgshVabMC68DSNZ3NXKgn21nCD5bDkX34iQP/tVYJVpklIXU1fvCrC4uQxxRhGzUu6c99784QvirnKldsBpbKsnzP5JKZJm/3ZUSDwcAF2+EXx2MGUyUBxPexyJB7DnOJEova9oJl/1Q48VOrepGuAMFqi8d0WmdFjMyp2p7iHsyS2BIVwIDAQAB" for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:33 [43257] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:34 np0005593102 certmonger[43257]: 2026-01-23 08:06:34 [43257] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[43257]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:06:34 np0005593102 certmonger[43257]: Certificate: "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" Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Certificate submission still ongoing. Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Certificate submission attempt complete. Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Child status = 0. Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Child output: Jan 23 08:06:34 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:06:34 np0005593102 certmonger[38898]: MIIFbDCCA9SgAwIBAgIQdMcavikRn/mP6uvt5F40ZTANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:34 np0005593102 certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:34 np0005593102 certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDYzNFoXDTI4MDEyNDA4MDYzNFowPzERMA8GA1UECgwI Jan 23 08:06:34 np0005593102 certmonger[38898]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:34 np0005593102 certmonger[38898]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMEFmd3/dTpXvN4Z Jan 23 08:06:34 np0005593102 certmonger[38898]: UoTuogtbtmv5Jd2FKrWK9agKt98tNAYltd2WeycS3X0ArVbr3nysyHpXrVYP3pIY Jan 23 08:06:34 np0005593102 certmonger[38898]: A8nTaP6yOGzU2rckqbU0PhkuPkzb39ZVizvgunAGzuE+7sUagWh+eT9afG4p7fK+ Jan 23 08:06:34 np0005593102 certmonger[38898]: RhMiKk7L1f3m/g4Vd9yAM3YLIVWmzAuvA0jWdzVyoJ9tZwg+Ww5F9+IkD/7VWCVa Jan 23 08:06:34 np0005593102 certmonger[38898]: ZJSF1NX7wqwuLkMcUYRs1LunPfe/OEL4q5ypXbAaWyrJ8z+SSmSZv92VEg8HABdv Jan 23 08:06:34 np0005593102 certmonger[38898]: hF8djBlMlAcT3sciQew5ziRKL2vaCZf9UOPFTq3qRrgDBaovHdFpnRYzMqdqe4h7 Jan 23 08:06:34 np0005593102 certmonger[38898]: MktgSFcCAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:34 np0005593102 certmonger[38898]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:34 np0005593102 certmonger[38898]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:34 np0005593102 certmonger[38898]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:34 np0005593102 certmonger[38898]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:34 np0005593102 certmonger[38898]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNFx Jan 23 08:06:34 np0005593102 certmonger[38898]: a8qk8sWQsWSf8s66FB9bJlYhMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU5MzEwMi5p Jan 23 08:06:34 np0005593102 certmonger[38898]: bnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w Jan 23 08:06:34 np0005593102 certmonger[38898]: MDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF Jan 23 08:06:34 np0005593102 certmonger[38898]: AgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw Jan 23 08:06:34 np0005593102 certmonger[38898]: NTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Jan 23 08:06:34 np0005593102 certmonger[38898]: IQYWV97WAO1XhMQYowThx3pYFuf+amsQz0UQ1LHIDQbaeP79HAjrA4vkNof0ynAx Jan 23 08:06:34 np0005593102 certmonger[38898]: H2OqDvOhf7C1Jn9FXLsdDefIwwvcL3Rhfcj5IF+8N/6it/f4LXfoNsn0bIVDlf5b Jan 23 08:06:34 np0005593102 certmonger[38898]: lMzrdKruykVHsvfIT6XZKf5w1jKFskuq0TSXdTga0/qvHVaZ/9GQcAlJ2T65bNyn Jan 23 08:06:34 np0005593102 certmonger[38898]: xBALqxcTxvCOvuj+5XGo9rW9mXsdqHs4TP/NvfAckw2iMIvzE4KESgXNFgYqO6o4 Jan 23 08:06:34 np0005593102 certmonger[38898]: Eut5DUJCdFt5SuO4n3vE8XoQj7MD/ZFQO0hmxV2OR0n9HhMs1CNFE0pXp7VKnhNv Jan 23 08:06:34 np0005593102 certmonger[38898]: r6BbC3u1dBZP5pJzviKLzkurYQlcd9pbn3Ogfbbdz6+9Cdh8GYHPomgnN3uu2dpo Jan 23 08:06:34 np0005593102 certmonger[38898]: CqQjSbRkFP8ekkXIu2BiR6kJ3uGAu1EcwMxTqO5zw59KppJTLZKMlUlxfbE5BnT6 Jan 23 08:06:34 np0005593102 certmonger[38898]: YieRNpufrXhv4sCKFuMhwM+iiCqdUI4R7qMWAWabCODchIpZVtJYDL2h3qScdDRH Jan 23 08:06:34 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:06:34 np0005593102 certmonger[38898]: " Jan 23 08:06:34 np0005593102 certmonger[43259]: 2026-01-23 08:06:34 [43259] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:06:34 np0005593102 certmonger[43259]: MIIFbDCCA9SgAwIBAgIQdMcavikRn/mP6uvt5F40ZTANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:34 np0005593102 certmonger[43259]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:34 np0005593102 certmonger[43259]: aXR5MB4XDTI2MDEyMzA4MDYzNFoXDTI4MDEyNDA4MDYzNFowPzERMA8GA1UECgwI Jan 23 08:06:34 np0005593102 certmonger[43259]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:34 np0005593102 certmonger[43259]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMEFmd3/dTpXvN4Z Jan 23 08:06:34 np0005593102 certmonger[43259]: UoTuogtbtmv5Jd2FKrWK9agKt98tNAYltd2WeycS3X0ArVbr3nysyHpXrVYP3pIY Jan 23 08:06:34 np0005593102 certmonger[43259]: A8nTaP6yOGzU2rckqbU0PhkuPkzb39ZVizvgunAGzuE+7sUagWh+eT9afG4p7fK+ Jan 23 08:06:34 np0005593102 certmonger[43259]: RhMiKk7L1f3m/g4Vd9yAM3YLIVWmzAuvA0jWdzVyoJ9tZwg+Ww5F9+IkD/7VWCVa Jan 23 08:06:34 np0005593102 certmonger[43259]: ZJSF1NX7wqwuLkMcUYRs1LunPfe/OEL4q5ypXbAaWyrJ8z+SSmSZv92VEg8HABdv Jan 23 08:06:34 np0005593102 certmonger[43259]: hF8djBlMlAcT3sciQew5ziRKL2vaCZf9UOPFTq3qRrgDBaovHdFpnRYzMqdqe4h7 Jan 23 08:06:34 np0005593102 certmonger[43259]: MktgSFcCAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:34 np0005593102 certmonger[43259]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:34 np0005593102 certmonger[43259]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:34 np0005593102 certmonger[43259]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:34 np0005593102 certmonger[43259]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:34 np0005593102 certmonger[43259]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNFx Jan 23 08:06:34 np0005593102 certmonger[43259]: a8qk8sWQsWSf8s66FB9bJlYhMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU5MzEwMi5p Jan 23 08:06:34 np0005593102 certmonger[43259]: bnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w Jan 23 08:06:34 np0005593102 certmonger[43259]: MDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF Jan 23 08:06:34 np0005593102 certmonger[43259]: AgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw Jan 23 08:06:34 np0005593102 certmonger[43259]: NTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Jan 23 08:06:34 np0005593102 certmonger[43259]: IQYWV97WAO1XhMQYowThx3pYFuf+amsQz0UQ1LHIDQbaeP79HAjrA4vkNof0ynAx Jan 23 08:06:34 np0005593102 certmonger[43259]: H2OqDvOhf7C1Jn9FXLsdDefIwwvcL3Rhfcj5IF+8N/6it/f4LXfoNsn0bIVDlf5b Jan 23 08:06:34 np0005593102 certmonger[43259]: lMzrdKruykVHsvfIT6XZKf5w1jKFskuq0TSXdTga0/qvHVaZ/9GQcAlJ2T65bNyn Jan 23 08:06:34 np0005593102 certmonger[43259]: xBALqxcTxvCOvuj+5XGo9rW9mXsdqHs4TP/NvfAckw2iMIvzE4KESgXNFgYqO6o4 Jan 23 08:06:34 np0005593102 certmonger[43259]: Eut5DUJCdFt5SuO4n3vE8XoQj7MD/ZFQO0hmxV2OR0n9HhMs1CNFE0pXp7VKnhNv Jan 23 08:06:34 np0005593102 certmonger[43259]: r6BbC3u1dBZP5pJzviKLzkurYQlcd9pbn3Ogfbbdz6+9Cdh8GYHPomgnN3uu2dpo Jan 23 08:06:34 np0005593102 certmonger[43259]: CqQjSbRkFP8ekkXIu2BiR6kJ3uGAu1EcwMxTqO5zw59KppJTLZKMlUlxfbE5BnT6 Jan 23 08:06:34 np0005593102 certmonger[43259]: YieRNpufrXhv4sCKFuMhwM+iiCqdUI4R7qMWAWabCODchIpZVtJYDL2h3qScdDRH Jan 23 08:06:34 np0005593102 certmonger[43259]: -----END CERTIFICATE----- Jan 23 08:06:34 np0005593102 certmonger[43259]: ". Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Certificate submission still ongoing. Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Certificate submission postprocessing complete. Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Child status = 0. Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Child output: Jan 23 08:06:34 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:06:34 np0005593102 certmonger[38898]: " Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:06:34 np0005593102 certmonger[38898]: MIIFbDCCA9SgAwIBAgIQdMcavikRn/mP6uvt5F40ZTANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:34 np0005593102 certmonger[38898]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:34 np0005593102 certmonger[38898]: aXR5MB4XDTI2MDEyMzA4MDYzNFoXDTI4MDEyNDA4MDYzNFowPzERMA8GA1UECgwI Jan 23 08:06:34 np0005593102 certmonger[38898]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:34 np0005593102 certmonger[38898]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMEFmd3/dTpXvN4Z Jan 23 08:06:34 np0005593102 certmonger[38898]: UoTuogtbtmv5Jd2FKrWK9agKt98tNAYltd2WeycS3X0ArVbr3nysyHpXrVYP3pIY Jan 23 08:06:34 np0005593102 certmonger[38898]: A8nTaP6yOGzU2rckqbU0PhkuPkzb39ZVizvgunAGzuE+7sUagWh+eT9afG4p7fK+ Jan 23 08:06:34 np0005593102 certmonger[38898]: RhMiKk7L1f3m/g4Vd9yAM3YLIVWmzAuvA0jWdzVyoJ9tZwg+Ww5F9+IkD/7VWCVa Jan 23 08:06:34 np0005593102 certmonger[38898]: ZJSF1NX7wqwuLkMcUYRs1LunPfe/OEL4q5ypXbAaWyrJ8z+SSmSZv92VEg8HABdv Jan 23 08:06:34 np0005593102 certmonger[38898]: hF8djBlMlAcT3sciQew5ziRKL2vaCZf9UOPFTq3qRrgDBaovHdFpnRYzMqdqe4h7 Jan 23 08:06:34 np0005593102 certmonger[38898]: MktgSFcCAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:34 np0005593102 certmonger[38898]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:34 np0005593102 certmonger[38898]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:34 np0005593102 certmonger[38898]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:34 np0005593102 certmonger[38898]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:34 np0005593102 certmonger[38898]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNFx Jan 23 08:06:34 np0005593102 certmonger[38898]: a8qk8sWQsWSf8s66FB9bJlYhMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU5MzEwMi5p Jan 23 08:06:34 np0005593102 certmonger[38898]: bnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w Jan 23 08:06:34 np0005593102 certmonger[38898]: MDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF Jan 23 08:06:34 np0005593102 certmonger[38898]: AgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw Jan 23 08:06:34 np0005593102 certmonger[38898]: NTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Jan 23 08:06:34 np0005593102 certmonger[38898]: IQYWV97WAO1XhMQYowThx3pYFuf+amsQz0UQ1LHIDQbaeP79HAjrA4vkNof0ynAx Jan 23 08:06:34 np0005593102 certmonger[38898]: H2OqDvOhf7C1Jn9FXLsdDefIwwvcL3Rhfcj5IF+8N/6it/f4LXfoNsn0bIVDlf5b Jan 23 08:06:34 np0005593102 certmonger[38898]: lMzrdKruykVHsvfIT6XZKf5w1jKFskuq0TSXdTga0/qvHVaZ/9GQcAlJ2T65bNyn Jan 23 08:06:34 np0005593102 certmonger[38898]: xBALqxcTxvCOvuj+5XGo9rW9mXsdqHs4TP/NvfAckw2iMIvzE4KESgXNFgYqO6o4 Jan 23 08:06:34 np0005593102 certmonger[38898]: Eut5DUJCdFt5SuO4n3vE8XoQj7MD/ZFQO0hmxV2OR0n9HhMs1CNFE0pXp7VKnhNv Jan 23 08:06:34 np0005593102 certmonger[38898]: r6BbC3u1dBZP5pJzviKLzkurYQlcd9pbn3Ogfbbdz6+9Cdh8GYHPomgnN3uu2dpo Jan 23 08:06:34 np0005593102 certmonger[38898]: CqQjSbRkFP8ekkXIu2BiR6kJ3uGAu1EcwMxTqO5zw59KppJTLZKMlUlxfbE5BnT6 Jan 23 08:06:34 np0005593102 certmonger[38898]: YieRNpufrXhv4sCKFuMhwM+iiCqdUI4R7qMWAWabCODchIpZVtJYDL2h3qScdDRH Jan 23 08:06:34 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:06:34 np0005593102 certmonger[38898]: ". Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] No hooks set for pre-save command. Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:34 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:34 np0005593102 certmonger[43360]: Certificate in file "/etc/pki/tls/certs/rabbitmq.crt" issued by CA and saved. Jan 23 08:06:34 np0005593102 certmonger[38898]: 2026-01-23 08:06:34 [38898] Wrote to /var/lib/certmonger/requests/20260123080633 Jan 23 08:06:35 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:35 np0005593102 python3[43376]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:41 np0005593102 podman[43377]: 2026-01-23 08:06:35.60098542 +0000 UTC m=+0.047015918 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 08:06:41 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:42 np0005593102 python3[43443]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 cluster.common.tag/rabbitmq:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:42 np0005593102 podman[43444]: 2026-01-23 08:06:42.077455475 +0000 UTC m=+0.033824019 image tag cf4ab8456a3abe57a7f04fa72c2968e2d1110502686fa60ebe007d8aced3db7d cluster.common.tag/rabbitmq:pcmklatest Jan 23 08:06:42 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:42 np0005593102 python3[43472]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:42 np0005593102 python3[43472]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 --format json Jan 23 08:06:42 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:42 np0005593102 python3[43472]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 -q --tls-verify=false Jan 23 08:06:46 np0005593102 podman[43484]: 2026-01-23 08:06:42.676027023 +0000 UTC m=+0.041568329 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 Jan 23 08:06:46 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:46 np0005593102 python3[43472]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a616d7a557ed72e2cb3c2f707314a11eec1313a010753921e54a824d721f2301 --format json Jan 23 08:06:46 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:46 np0005593102 python3[43574]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:46 np0005593102 python3[43574]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 --format json Jan 23 08:06:46 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:46 np0005593102 python3[43574]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 -q --tls-verify=false Jan 23 08:06:51 np0005593102 podman[43585]: 2026-01-23 08:06:46.919759513 +0000 UTC m=+0.031697543 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 Jan 23 08:06:51 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:51 np0005593102 python3[43574]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7ad54cee06bf23c7a73c6382f7e21cdf8ca093b59b1eba9d085eff95472a36e6 --format json Jan 23 08:06:51 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:51 np0005593102 python3[43661]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:51 np0005593102 python3[43661]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 --format json Jan 23 08:06:51 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:51 np0005593102 python3[43661]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 -q --tls-verify=false Jan 23 08:06:54 np0005593102 podman[43674]: 2026-01-23 08:06:51.871268295 +0000 UTC m=+0.048698801 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 Jan 23 08:06:54 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:54 np0005593102 python3[43661]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8ece98bf1089a0d3fdab5c6a92a2dd64fc4b0f8b7a05f2bfebd5d06b0149991f --format json Jan 23 08:06:54 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:54 np0005593102 python3[43751]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:54 np0005593102 python3[43751]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 --format json Jan 23 08:06:54 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:54 np0005593102 python3[43751]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 -q --tls-verify=false Jan 23 08:06:57 np0005593102 podman[43763]: 2026-01-23 08:06:54.603979637 +0000 UTC m=+0.044738413 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 08:06:57 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:57 np0005593102 python3[43751]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8bd08f386db64f8894158012c608a496eb287cf99090b41e503a9bc591b481e6 --format json Jan 23 08:06:57 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:57 np0005593102 python3[43840]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:57 np0005593102 python3[43840]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 --format json Jan 23 08:06:58 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:58 np0005593102 python3[43840]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 -q --tls-verify=false Jan 23 08:07:00 np0005593102 podman[43853]: 2026-01-23 08:06:58.074808183 +0000 UTC m=+0.042599634 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 08:07:00 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:00 np0005593102 python3[43840]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect bac901955dcf7a32a493c6ef724c092009bbc18467858aa8c55e916b8c2b2b8f --format json Jan 23 08:07:00 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:00 np0005593102 python3[43928]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:00 np0005593102 python3[43928]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 --format json Jan 23 08:07:00 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:00 np0005593102 python3[43928]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 -q --tls-verify=false Jan 23 08:07:02 np0005593102 podman[43941]: 2026-01-23 08:07:00.792481014 +0000 UTC m=+0.041518480 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 08:07:02 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:02 np0005593102 python3[43928]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b13c44df76d5b3bb87652b20507cc40d62568630b0249319c13c07bbb18c36c3 --format json Jan 23 08:07:02 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:02 np0005593102 python3[44007]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:02 np0005593102 python3[44007]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 --format json Jan 23 08:07:02 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:02 np0005593102 python3[44007]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 -q --tls-verify=false Jan 23 08:07:04 np0005593102 podman[44019]: 2026-01-23 08:07:02.875453292 +0000 UTC m=+0.046453338 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 08:07:04 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:04 np0005593102 python3[44007]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect cf4ab8456a3abe57a7f04fa72c2968e2d1110502686fa60ebe007d8aced3db7d --format json Jan 23 08:07:04 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:05 np0005593102 python3[44085]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:05 np0005593102 python3[44085]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 --format json Jan 23 08:07:05 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:05 np0005593102 python3[44085]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 -q --tls-verify=false Jan 23 08:07:09 np0005593102 podman[44097]: 2026-01-23 08:07:05.38591766 +0000 UTC m=+0.030920180 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 08:07:09 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:09 np0005593102 python3[44085]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b9d7c6447d3e11e4b7bc4c1a8872a5471a9020b0347f9e0a44060d9b2823bfe3 --format json Jan 23 08:07:09 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:10 np0005593102 python3[44175]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:10 np0005593102 python3[44175]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 --format json Jan 23 08:07:10 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:10 np0005593102 python3[44175]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 -q --tls-verify=false Jan 23 08:07:16 np0005593102 podman[44188]: 2026-01-23 08:07:10.291319111 +0000 UTC m=+0.042361337 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Jan 23 08:07:16 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:16 np0005593102 python3[44175]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 0b85a6c916779a2364dabc601af2849008f8a7bb090497d470f183826d209742 --format json Jan 23 08:07:16 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:16 np0005593102 python3[44360]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:16 np0005593102 python3[44360]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 --format json Jan 23 08:07:16 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:16 np0005593102 python3[44360]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 -q --tls-verify=false Jan 23 08:07:18 np0005593102 podman[44372]: 2026-01-23 08:07:16.648551678 +0000 UTC m=+0.048698669 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 Jan 23 08:07:18 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:18 np0005593102 python3[44360]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8bb56ea60f206582ac0e8abc44419c975a910cdb0dffbce91bd34eb53d7f0cc0 --format json Jan 23 08:07:18 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:19 np0005593102 python3[44449]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:19 np0005593102 python3[44449]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 --format json Jan 23 08:07:19 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:19 np0005593102 python3[44449]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 -q --tls-verify=false Jan 23 08:07:29 np0005593102 podman[44461]: 2026-01-23 08:07:19.31782521 +0000 UTC m=+0.044535916 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 08:07:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:29 np0005593102 python3[44449]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 2d473f0d6d0f3d389f26cf8e584cb2217e1a9f089f6623537c64c4ebe593ba39 --format json Jan 23 08:07:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:29 np0005593102 python3[44714]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:29 np0005593102 python3[44714]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 --format json Jan 23 08:07:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:29 np0005593102 python3[44714]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 -q --tls-verify=false Jan 23 08:07:37 np0005593102 podman[44726]: 2026-01-23 08:07:29.862035905 +0000 UTC m=+0.040866879 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Jan 23 08:07:37 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:37 np0005593102 python3[44714]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 59c0f32bbd0d880fb7671f77c7f9fe7eba6371b76ea661a3802be79175c9cf97 --format json Jan 23 08:07:37 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:37 np0005593102 python3[44816]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:37 np0005593102 python3[44816]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 --format json Jan 23 08:07:37 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:37 np0005593102 python3[44816]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 -q --tls-verify=false Jan 23 08:07:44 np0005593102 podman[44828]: 2026-01-23 08:07:37.561484222 +0000 UTC m=+0.040433375 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Jan 23 08:07:44 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:44 np0005593102 python3[44816]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d33cd7cbe30b5f4b1aaa37c443e1d6a0ab7f5cf2aaa69525a32fda95900b6c10 --format json Jan 23 08:07:45 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:45 np0005593102 python3[44907]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:45 np0005593102 python3[44907]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 --format json Jan 23 08:07:45 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:45 np0005593102 python3[44907]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 -q --tls-verify=false Jan 23 08:07:49 np0005593102 podman[44919]: 2026-01-23 08:07:45.462370787 +0000 UTC m=+0.041347305 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Jan 23 08:07:49 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:49 np0005593102 python3[44907]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 431c4154374af6b6d532165560f80c367b832346d0d836548da79db297917d4e --format json Jan 23 08:07:49 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:50 np0005593102 python3[45006]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:50 np0005593102 python3[45006]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 --format json Jan 23 08:07:50 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:50 np0005593102 python3[45006]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 -q --tls-verify=false Jan 23 08:07:53 np0005593102 podman[45020]: 2026-01-23 08:07:50.302065284 +0000 UTC m=+0.026405556 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Jan 23 08:07:53 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:53 np0005593102 python3[45006]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d91d671d486b16c1c793bf9221f9d0576c18fc58940981d37833abeb53fd5301 --format json Jan 23 08:07:53 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:53 np0005593102 python3[45099]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:53 np0005593102 python3[45099]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 --format json Jan 23 08:07:53 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:53 np0005593102 python3[45099]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 -q --tls-verify=false Jan 23 08:08:02 np0005593102 podman[45111]: 2026-01-23 08:07:53.609244973 +0000 UTC m=+0.043828414 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Jan 23 08:08:02 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:02 np0005593102 python3[45099]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a579d4fdbda482f87d090081f6e846234e7904d62181a063e2d9b35577177b9f --format json Jan 23 08:08:02 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:03 np0005593102 python3[45206]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:03 np0005593102 python3[45206]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 --format json Jan 23 08:08:03 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:03 np0005593102 python3[45206]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 -q --tls-verify=false Jan 23 08:08:04 np0005593102 sshd[45232]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:08:15 np0005593102 podman[45219]: 2026-01-23 08:08:03.449912755 +0000 UTC m=+0.044014978 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 08:08:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:15 np0005593102 python3[45206]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ea72abdd68f9a2d0af97778644413f0df0dab9d453b865185a199c5c12f4e55d --format json Jan 23 08:08:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:15 np0005593102 python3[45625]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:15 np0005593102 python3[45625]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 --format json Jan 23 08:08:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:15 np0005593102 python3[45625]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 -q --tls-verify=false Jan 23 08:08:17 np0005593102 podman[45637]: 2026-01-23 08:08:15.663244538 +0000 UTC m=+0.040448494 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Jan 23 08:08:17 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:17 np0005593102 python3[45625]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 835b9fac535c710ebcd7589f0ff14498479122b0c8b5628384d8a3491dd522b8 --format json Jan 23 08:08:17 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:18 np0005593102 python3[45715]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:18 np0005593102 python3[45715]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 --format json Jan 23 08:08:18 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:18 np0005593102 python3[45715]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 -q --tls-verify=false Jan 23 08:08:22 np0005593102 podman[45728]: 2026-01-23 08:08:18.417235978 +0000 UTC m=+0.043792180 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Jan 23 08:08:22 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:22 np0005593102 python3[45715]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ff1f91308b6fbe9092c5f1e2edb9f228bf32084b8df80485aea656b2849547d7 --format json Jan 23 08:08:22 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:22 np0005593102 python3[46061]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:22 np0005593102 python3[46061]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 --format json Jan 23 08:08:22 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:22 np0005593102 python3[46061]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 -q --tls-verify=false Jan 23 08:08:23 np0005593102 sshd[46088]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:08:26 np0005593102 krb5_child[46135]: Preauthentication failed Jan 23 08:08:26 np0005593102 krb5_child[46135]: Preauthentication failed Jan 23 08:08:26 np0005593102 podman[46074]: 2026-01-23 08:08:22.614442776 +0000 UTC m=+0.036800179 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 Jan 23 08:08:26 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:26 np0005593102 python3[46061]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 93ea0c0505cfd89e3e321f4bacb12a17fef6f01eb6141df9dbcc45821d42917f --format json Jan 23 08:08:26 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:26 np0005593102 python3[46170]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:26 np0005593102 python3[46170]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 --format json Jan 23 08:08:26 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:26 np0005593102 python3[46170]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 -q --tls-verify=false Jan 23 08:08:29 np0005593102 podman[46183]: 2026-01-23 08:08:26.866002495 +0000 UTC m=+0.032771980 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Jan 23 08:08:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:29 np0005593102 python3[46170]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 01162f309a727f9f16ef893d348a6167be101f9c31f2a9a381f4a430ffc3b21a --format json Jan 23 08:08:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:29 np0005593102 python3[46249]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:29 np0005593102 python3[46249]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 --format json Jan 23 08:08:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:29 np0005593102 python3[46249]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 -q --tls-verify=false Jan 23 08:08:31 np0005593102 podman[46262]: 2026-01-23 08:08:29.578156794 +0000 UTC m=+0.032952347 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Jan 23 08:08:31 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:31 np0005593102 python3[46249]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ccd22ddeb69c8f3a05d2d3f97d21f9fa64c6f2bc3a156f93212de7feacea314f --format json Jan 23 08:08:31 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:31 np0005593102 python3[46327]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:31 np0005593102 python3[46327]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 --format json Jan 23 08:08:31 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:31 np0005593102 python3[46327]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 -q --tls-verify=false Jan 23 08:08:37 np0005593102 podman[46341]: 2026-01-23 08:08:32.020992121 +0000 UTC m=+0.040345432 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Jan 23 08:08:37 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:37 np0005593102 python3[46327]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 24976907b2c2553304119aba5731a800204d664feed24ca9eb7f2b4c7d81016b --format json Jan 23 08:08:37 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:37 np0005593102 python3[46418]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:37 np0005593102 python3[46418]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 --format json Jan 23 08:08:37 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:37 np0005593102 python3[46418]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 -q --tls-verify=false Jan 23 08:08:40 np0005593102 podman[46431]: 2026-01-23 08:08:37.580961012 +0000 UTC m=+0.043406956 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Jan 23 08:08:40 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:40 np0005593102 python3[46418]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 57163a7b21fdbb804a27897cb6e6052a5e5c7a339c45d663e80b52375a760dcf --format json Jan 23 08:08:40 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:40 np0005593102 python3[46510]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:40 np0005593102 python3[46510]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 --format json Jan 23 08:08:40 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:40 np0005593102 python3[46510]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 -q --tls-verify=false Jan 23 08:08:42 np0005593102 podman[46522]: 2026-01-23 08:08:41.007574322 +0000 UTC m=+0.029567129 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Jan 23 08:08:42 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:42 np0005593102 python3[46510]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b9682dee21d7c5836da0f5094cc87a67e8c855fb08692e50824e31ad6f3d7b7f --format json Jan 23 08:08:42 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:43 np0005593102 python3[46590]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:43 np0005593102 python3[46590]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 --format json Jan 23 08:08:43 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:43 np0005593102 python3[46590]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 -q --tls-verify=false Jan 23 08:08:45 np0005593102 podman[46602]: 2026-01-23 08:08:43.225088714 +0000 UTC m=+0.046461373 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Jan 23 08:08:45 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:45 np0005593102 python3[46590]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 076d82a27d63c8328729ed27ceb4291585ae18d017befe6fe353df7aa11715ae --format json Jan 23 08:08:45 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:45 np0005593102 python3[46680]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:45 np0005593102 python3[46680]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 --format json Jan 23 08:08:45 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:45 np0005593102 python3[46680]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 -q --tls-verify=false Jan 23 08:08:50 np0005593102 podman[46692]: 2026-01-23 08:08:45.790182916 +0000 UTC m=+0.030110788 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 08:08:50 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:50 np0005593102 python3[46680]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a2405b5037b4ecda355ba679b0452a03af79396a3962d913c65d6e971ae04ad9 --format json Jan 23 08:08:50 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:51 np0005593102 python3[46866]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:51 np0005593102 python3[46866]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 --format json Jan 23 08:08:51 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:51 np0005593102 python3[46866]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 -q --tls-verify=false Jan 23 08:08:54 np0005593102 podman[46879]: 2026-01-23 08:08:51.200850733 +0000 UTC m=+0.042303113 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Jan 23 08:08:54 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:54 np0005593102 python3[46866]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d9a3b5ac0adeeb65fb1be6ff5d0045b0f5c343dcfec19ba43a878e23890d2b6e --format json Jan 23 08:08:54 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:54 np0005593102 python3[46954]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:54 np0005593102 python3[46954]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 --format json Jan 23 08:08:54 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:54 np0005593102 python3[46954]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 -q --tls-verify=false Jan 23 08:08:57 np0005593102 podman[46967]: 2026-01-23 08:08:54.798213669 +0000 UTC m=+0.049134363 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Jan 23 08:08:57 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:57 np0005593102 python3[46954]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 9bc6fb316da179dd124d351484d6f1112e635a607defab7b2cc5463bbb6bf086 --format json Jan 23 08:08:57 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:57 np0005593102 python3[47044]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:57 np0005593102 python3[47044]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 --format json Jan 23 08:08:57 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:57 np0005593102 python3[47044]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 -q --tls-verify=false Jan 23 08:08:59 np0005593102 podman[47056]: 2026-01-23 08:08:57.483831591 +0000 UTC m=+0.043501140 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Jan 23 08:08:59 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:59 np0005593102 python3[47044]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e6e981540e553415b2d6eda490d7683db07164af2e7a0af8245623900338a4d6 --format json Jan 23 08:08:59 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:00 np0005593102 python3[47134]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:00 np0005593102 python3[47134]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 --format json Jan 23 08:09:00 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:00 np0005593102 python3[47134]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 -q --tls-verify=false Jan 23 08:09:03 np0005593102 podman[47146]: 2026-01-23 08:09:00.418361634 +0000 UTC m=+0.043760907 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 08:09:03 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:03 np0005593102 python3[47134]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 5710c4c9977d2ec6efe2229a91f94fd5ac38b06ccb63c09ee3ce15dd3c2f8756 --format json Jan 23 08:09:03 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:03 np0005593102 python3[47225]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:03 np0005593102 python3[47225]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 --format json Jan 23 08:09:03 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:03 np0005593102 python3[47225]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 -q --tls-verify=false Jan 23 08:09:06 np0005593102 podman[47238]: 2026-01-23 08:09:03.96376827 +0000 UTC m=+0.043956844 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Jan 23 08:09:06 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:06 np0005593102 python3[47225]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ede96ea916c936d09aefbff926e4cdbe1be4aeb7a9a1581064259698ac9d6d38 --format json Jan 23 08:09:06 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:06 np0005593102 python3[47315]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:06 np0005593102 python3[47315]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 --format json Jan 23 08:09:06 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:06 np0005593102 python3[47315]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 -q --tls-verify=false Jan 23 08:09:10 np0005593102 podman[47329]: 2026-01-23 08:09:07.040070317 +0000 UTC m=+0.043065186 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Jan 23 08:09:10 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:10 np0005593102 python3[47315]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 87ee88cbf01fb42e0b22747072843bcca6130a90eda4de6e74b3ccd847bb4040 --format json Jan 23 08:09:10 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:10 np0005593102 python3[47407]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:10 np0005593102 python3[47407]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 --format json Jan 23 08:09:10 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:10 np0005593102 python3[47407]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 -q --tls-verify=false Jan 23 08:09:12 np0005593102 podman[47419]: 2026-01-23 08:09:10.867088141 +0000 UTC m=+0.033039368 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 Jan 23 08:09:12 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:12 np0005593102 python3[47407]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d51fd7ce5400a7c4800bb82d80a52f917f3accf6aa602b7c20c427b481ad1e6b --format json Jan 23 08:09:12 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:13 np0005593102 python3[47496]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:13 np0005593102 python3[47496]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 --format json Jan 23 08:09:13 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:13 np0005593102 python3[47496]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 -q --tls-verify=false Jan 23 08:09:15 np0005593102 podman[47509]: 2026-01-23 08:09:13.118966133 +0000 UTC m=+0.046071149 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 Jan 23 08:09:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:15 np0005593102 python3[47496]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 6888a3a7246be9d1931c9a82c3e6b98c4ec30e2e363b80647ef78110ef87f229 --format json Jan 23 08:09:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:15 np0005593102 python3[47586]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:15 np0005593102 python3[47586]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 --format json Jan 23 08:09:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:15 np0005593102 python3[47586]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 -q --tls-verify=false Jan 23 08:09:19 np0005593102 podman[47598]: 2026-01-23 08:09:16.024242706 +0000 UTC m=+0.049085781 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 Jan 23 08:09:19 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:19 np0005593102 python3[47586]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect bca5bfd4d7b21ee858ad76cbe422ed1ea846fc4024ae502e9ed52eba39883d76 --format json Jan 23 08:09:19 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:19 np0005593102 python3[47676]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:19 np0005593102 python3[47676]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 --format json Jan 23 08:09:19 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:19 np0005593102 python3[47676]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 -q --tls-verify=false Jan 23 08:09:22 np0005593102 podman[47690]: 2026-01-23 08:09:19.908963527 +0000 UTC m=+0.046802982 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Jan 23 08:09:22 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:22 np0005593102 python3[47676]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 4d6ea8e2ec83f47f1713b4a93aa453a808e455a73bda48fb8ecdf020c5ccd5cb --format json Jan 23 08:09:22 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:22 np0005593102 python3[47768]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:22 np0005593102 python3[47768]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 --format json Jan 23 08:09:22 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:22 np0005593102 python3[47768]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 -q --tls-verify=false Jan 23 08:09:26 np0005593102 podman[47780]: 2026-01-23 08:09:22.953998222 +0000 UTC m=+0.046180803 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Jan 23 08:09:26 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:26 np0005593102 python3[47768]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7c77ef06363cc542abd59edc23ca348c84dc9f8a4ac2248a34728abb4e15057d --format json Jan 23 08:09:26 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:27 np0005593102 python3[47914]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:09:28 np0005593102 python3[47934]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:09:31 np0005593102 python3[47951]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:09:34 np0005593102 python3[47968]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:09:34 np0005593102 python3[47984]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:09:35 np0005593102 python3[48000]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:09:36 np0005593102 python3[48018]: ansible-certificate_request Invoked with name=redis dns=['np0005593102.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['redis/np0005593102.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep redis_tls_proxy)#012service_crt="/etc/pki/tls/certs/redis.crt"#012service_key="/etc/pki/tls/private/redis.key"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown memcached:memcached "$service_crt"#012podman exec "$container_name" chown memcached:memcached "$service_key"#012# Trigger a reload for stunnel to read the new certificate#012podman exec pkill -o -HUP stunnel#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:36 np0005593102 certmonger[38898]: 2026-01-23 08:09:36 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593102.internalapi.ooo.test" for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593102.internalapi.ooo.test Jan 23 08:09:37 np0005593102 certmonger[48028]: overcloud.internalapi.ooo.test Jan 23 08:09:37 np0005593102 certmonger[48028]: " for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_REQ_PRINCIPAL" to "redis/np0005593102.internalapi.ooo.test@OOO.TEST Jan 23 08:09:37 np0005593102 certmonger[48028]: " for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:09:37 np0005593102 certmonger[48028]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAyLmludGVybmFsYXBp Jan 23 08:09:37 np0005593102 certmonger[48028]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoM5xnKYa Jan 23 08:09:37 np0005593102 certmonger[48028]: UUesPds382zB303vuMiw4IyEe72inU2/F/9i8s+ksl7rFKnhsaqAyOiG4VgVBJib Jan 23 08:09:37 np0005593102 certmonger[48028]: gtxw+ZjVE92jQX5NCycU6Cio8FywXVI0XyMQF3oyIJbZzGxx3JLi9Viz0YZZT18l Jan 23 08:09:37 np0005593102 certmonger[48028]: NAPwOYNLH4/tMj6Puod5YyHUUnPyLijZw6M4Qcy7y8vuchyHxMLqRFSokFqAOmtd Jan 23 08:09:37 np0005593102 certmonger[48028]: osxB94lMIEPuvN+b7u/LSpgWdfTogKmx7ovwjsDf/n6/8UMVXemIWvWqe/FEfsj0 Jan 23 08:09:37 np0005593102 certmonger[48028]: IoeAzjZlHNmpOAlol+AymxzdmFPSrQDPkuIYS2gzApNBNzCwuhAVNk1R+dBgDnHr Jan 23 08:09:37 np0005593102 certmonger[48028]: 5544v781CSnZNwIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:09:37 np0005593102 certmonger[48028]: ADIAMwAwADgAMAA5ADMANjCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Jan 23 08:09:37 np0005593102 certmonger[48028]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:09:37 np0005593102 certmonger[48028]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Jan 23 08:09:37 np0005593102 certmonger[48028]: FAIDoDIMMHJlZGlzL25wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdEBP Jan 23 08:09:37 np0005593102 certmonger[48028]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Jan 23 08:09:37 np0005593102 certmonger[48028]: cmVkaXMbIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Jan 23 08:09:37 np0005593102 certmonger[48028]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Jan 23 08:09:37 np0005593102 certmonger[48028]: ih13yXcq5hDb76E45pba+46nx+EwDQYJKoZIhvcNAQELBQADggEBAIAQ36lgXkXP Jan 23 08:09:37 np0005593102 certmonger[48028]: AnLXd0+n2rZ7KVrkkkLTxVaibcxrMcdeajoWa62u7Y5zIXK1LGQBxW3N41O5r3wO Jan 23 08:09:37 np0005593102 certmonger[48028]: w2T7fSphxB0j+IxBqBumqLdpXeyEF2EnMExmaMKkedIEWGf+SE3zc0/TeYUpe2bh Jan 23 08:09:37 np0005593102 certmonger[48028]: noJcik+iA5X7uHIiqUUBHGIoTYCHmVwRBDIbJQiQhOh3IsvLjorTDDCcAHSupRCF Jan 23 08:09:37 np0005593102 certmonger[48028]: wFNXcYxcEjtmcdDIYOP3LfPFhVqUGxbGjTtGqVje1i8xWBHaql+AQCRDnJ1C/N5z Jan 23 08:09:37 np0005593102 certmonger[48028]: izvUfURYTFARATpiw8UK+dDWvEhT1Pq6dFutoqyLhbePfijgXSI1xfFYuTtJyJae Jan 23 08:09:37 np0005593102 certmonger[48028]: F8xBT1D69a8= Jan 23 08:09:37 np0005593102 certmonger[48028]: -----END CERTIFICATE REQUEST----- Jan 23 08:09:37 np0005593102 certmonger[48028]: " for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgznGcphpRR6w92zfzbMHfTe+4yLDgjIR7vaKdTb8X/2Lyz6SyXusUqeGxqoDI6IbhWBUEmJuC3HD5mNUT3aNBfk0LJxToKKjwXLBdUjRfIxAXejIgltnMbHHckuL1WLPRhllPXyU0A/A5g0sfj+0yPo+6h3ljIdRSc/IuKNnDozhBzLvLy+5yHIfEwupEVKiQWoA6a12izEH3iUwgQ+6835vu78tKmBZ19OiAqbHui/COwN/+fr/xQxVd6Yha9ap78UR+yPQih4DONmUc2ak4CWiX4DKbHN2YU9KtAM+S4hhLaDMCk0E3MLC6EBU2TVH50GAOcevnnji/vzUJKdk3AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAQRixeAWeBtIPRhaWS/8u2O5aaKXKdYJlMJ8tFfAFXH1TERqRKfDHSyi4DBNqIGt+D73ttVau05DafLXiHk96CtnLgCl726QyIYmMglQD3z7x7Aoo7tODfZxi+LlfQwc+25KUM6jUQSzfUhreD05K+M9CSlZTSCEVHeKptxTDucRgagaUfxJj6ktCMvd0cEHxFNZBN98MAyioXVyL0Ov9fB6Dcr7S0dDz9vvF+mLuVVQK68PRc2rpv+NrM3VTgJWDllfcM3TLCRPJGUusL8iD5lAAGDqQJuUVqmPGGLjnxf9HzJYDeCZzs5B+z5F9cTAVfOqh7I/+EpCytkaFLZz+uA==" for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoM5xnKYaUUesPds382zB303vuMiw4IyEe72inU2/F/9i8s+ksl7rFKnhsaqAyOiG4VgVBJibgtxw+ZjVE92jQX5NCycU6Cio8FywXVI0XyMQF3oyIJbZzGxx3JLi9Viz0YZZT18lNAPwOYNLH4/tMj6Puod5YyHUUnPyLijZw6M4Qcy7y8vuchyHxMLqRFSokFqAOmtdosxB94lMIEPuvN+b7u/LSpgWdfTogKmx7ovwjsDf/n6/8UMVXemIWvWqe/FEfsj0IoeAzjZlHNmpOAlol+AymxzdmFPSrQDPkuIYS2gzApNBNzCwuhAVNk1R+dBgDnHr5544v781CSnZNwIDAQAB" for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:09:37 np0005593102 certmonger[48028]: 2026-01-23 08:09:37 [48028] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[48028]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:09:37 np0005593102 certmonger[48028]: Certificate: "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" Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Certificate submission still ongoing. Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Certificate submission attempt complete. Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Child status = 0. Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Child output: Jan 23 08:09:37 np0005593102 certmonger[38898]: "-----BEGIN CERTIFICATE----- Jan 23 08:09:37 np0005593102 certmonger[38898]: MIIFhzCCA++gAwIBAgIRAJIno3Q1h4LYeCQVx5PuR00wDQYJKoZIhvcNAQELBQAw Jan 23 08:09:37 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:09:37 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA5MzdaFw0yODAxMjQwODA5MzdaMD8xETAPBgNVBAoM Jan 23 08:09:37 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:09:37 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgznGcphpRR6w9 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2zfzbMHfTe+4yLDgjIR7vaKdTb8X/2Lyz6SyXusUqeGxqoDI6IbhWBUEmJuC3HD5 Jan 23 08:09:37 np0005593102 certmonger[38898]: mNUT3aNBfk0LJxToKKjwXLBdUjRfIxAXejIgltnMbHHckuL1WLPRhllPXyU0A/A5 Jan 23 08:09:37 np0005593102 certmonger[38898]: g0sfj+0yPo+6h3ljIdRSc/IuKNnDozhBzLvLy+5yHIfEwupEVKiQWoA6a12izEH3 Jan 23 08:09:37 np0005593102 certmonger[38898]: iUwgQ+6835vu78tKmBZ19OiAqbHui/COwN/+fr/xQxVd6Yha9ap78UR+yPQih4DO Jan 23 08:09:37 np0005593102 certmonger[38898]: NmUc2ak4CWiX4DKbHN2YU9KtAM+S4hhLaDMCk0E3MLC6EBU2TVH50GAOcevnnji/ Jan 23 08:09:37 np0005593102 certmonger[38898]: vzUJKdk3AgMBAAGjggIIMIICBDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:09:37 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:09:37 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:09:37 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:09:37 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:09:37 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTv Jan 23 08:09:37 np0005593102 certmonger[38898]: 36tjcZM40iFtMW4bSU0hhqn2vTCB4QYDVR0RBIHZMIHWgiFucDAwMDU1OTMxMDIu Jan 23 08:09:37 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Jan 23 08:09:37 np0005593102 certmonger[38898]: dGVzdKBABgorBgEEAYI3FAIDoDIMMHJlZGlzL25wMDAwNTU5MzEwMi5pbnRlcm5h Jan 23 08:09:37 np0005593102 certmonger[38898]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNU Jan 23 08:09:37 np0005593102 certmonger[38898]: oTUwM6ADAgEBoSwwKhsFcmVkaXMbIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5v Jan 23 08:09:37 np0005593102 certmonger[38898]: b28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABZ82BSYmWGKyeX2EysW/Hr6gxh+L Jan 23 08:09:37 np0005593102 certmonger[38898]: uEsLTEHMz62THviXjs8/E3LeiveSRYtAk/lgyRpm8LAFvBok7S1lG7ZqPFVSHZ+6 Jan 23 08:09:37 np0005593102 certmonger[38898]: vIn/a2WrW5P0xS8+n8Wk40fa4gGnjmayJSOC8wP99oouVyxiPdQ8m8h5O5KOmcYf Jan 23 08:09:37 np0005593102 certmonger[38898]: seczKruiLepSFwqRC82Vb2KqStBPIokArwEW1OtaEFcFayZR2L6VdZigq2t6nvyq Jan 23 08:09:37 np0005593102 certmonger[38898]: EBVp5oTj9JT0jB6Dh749UoLDdvESqTAvUpvEyaHy5eRry7y5p4RKxs5heKKbUdaL Jan 23 08:09:37 np0005593102 certmonger[38898]: 2/pF1BfYgAbiflk96O8L6uOyGfxIt7W6j6q5Np3KWCdyVoBRGsV+debea+TQn9My Jan 23 08:09:37 np0005593102 certmonger[38898]: 4MeSWqsVD1zbDYDRn2KZHvizvWfblgpk7jAMf/FtKmcPUrCh4MNimG1UA6uucNq2 Jan 23 08:09:37 np0005593102 certmonger[38898]: by6/upgT4q2Lb78kDYmM1xHxsYt1kjSTmj+lKupkOeq/bmHLsD7Zot3Do8qV8PLi Jan 23 08:09:37 np0005593102 certmonger[38898]: fmtSKE0HmvYMPyB8XPzy8P+gOJenfihGChdo Jan 23 08:09:37 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:09:37 np0005593102 certmonger[38898]: " Jan 23 08:09:37 np0005593102 certmonger[48030]: 2026-01-23 08:09:37 [48030] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:09:37 np0005593102 certmonger[48030]: MIIFhzCCA++gAwIBAgIRAJIno3Q1h4LYeCQVx5PuR00wDQYJKoZIhvcNAQELBQAw Jan 23 08:09:37 np0005593102 certmonger[48030]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:09:37 np0005593102 certmonger[48030]: cml0eTAeFw0yNjAxMjMwODA5MzdaFw0yODAxMjQwODA5MzdaMD8xETAPBgNVBAoM Jan 23 08:09:37 np0005593102 certmonger[48030]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:09:37 np0005593102 certmonger[48030]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgznGcphpRR6w9 Jan 23 08:09:37 np0005593102 certmonger[48030]: 2zfzbMHfTe+4yLDgjIR7vaKdTb8X/2Lyz6SyXusUqeGxqoDI6IbhWBUEmJuC3HD5 Jan 23 08:09:37 np0005593102 certmonger[48030]: mNUT3aNBfk0LJxToKKjwXLBdUjRfIxAXejIgltnMbHHckuL1WLPRhllPXyU0A/A5 Jan 23 08:09:37 np0005593102 certmonger[48030]: g0sfj+0yPo+6h3ljIdRSc/IuKNnDozhBzLvLy+5yHIfEwupEVKiQWoA6a12izEH3 Jan 23 08:09:37 np0005593102 certmonger[48030]: iUwgQ+6835vu78tKmBZ19OiAqbHui/COwN/+fr/xQxVd6Yha9ap78UR+yPQih4DO Jan 23 08:09:37 np0005593102 certmonger[48030]: NmUc2ak4CWiX4DKbHN2YU9KtAM+S4hhLaDMCk0E3MLC6EBU2TVH50GAOcevnnji/ Jan 23 08:09:37 np0005593102 certmonger[48030]: vzUJKdk3AgMBAAGjggIIMIICBDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:09:37 np0005593102 certmonger[48030]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:09:37 np0005593102 certmonger[48030]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:09:37 np0005593102 certmonger[48030]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:09:37 np0005593102 certmonger[48030]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:09:37 np0005593102 certmonger[48030]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTv Jan 23 08:09:37 np0005593102 certmonger[48030]: 36tjcZM40iFtMW4bSU0hhqn2vTCB4QYDVR0RBIHZMIHWgiFucDAwMDU1OTMxMDIu Jan 23 08:09:37 np0005593102 certmonger[48030]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Jan 23 08:09:37 np0005593102 certmonger[48030]: dGVzdKBABgorBgEEAYI3FAIDoDIMMHJlZGlzL25wMDAwNTU5MzEwMi5pbnRlcm5h Jan 23 08:09:37 np0005593102 certmonger[48030]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNU Jan 23 08:09:37 np0005593102 certmonger[48030]: oTUwM6ADAgEBoSwwKhsFcmVkaXMbIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5v Jan 23 08:09:37 np0005593102 certmonger[48030]: b28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABZ82BSYmWGKyeX2EysW/Hr6gxh+L Jan 23 08:09:37 np0005593102 certmonger[48030]: uEsLTEHMz62THviXjs8/E3LeiveSRYtAk/lgyRpm8LAFvBok7S1lG7ZqPFVSHZ+6 Jan 23 08:09:37 np0005593102 certmonger[48030]: vIn/a2WrW5P0xS8+n8Wk40fa4gGnjmayJSOC8wP99oouVyxiPdQ8m8h5O5KOmcYf Jan 23 08:09:37 np0005593102 certmonger[48030]: seczKruiLepSFwqRC82Vb2KqStBPIokArwEW1OtaEFcFayZR2L6VdZigq2t6nvyq Jan 23 08:09:37 np0005593102 certmonger[48030]: EBVp5oTj9JT0jB6Dh749UoLDdvESqTAvUpvEyaHy5eRry7y5p4RKxs5heKKbUdaL Jan 23 08:09:37 np0005593102 certmonger[48030]: 2/pF1BfYgAbiflk96O8L6uOyGfxIt7W6j6q5Np3KWCdyVoBRGsV+debea+TQn9My Jan 23 08:09:37 np0005593102 certmonger[48030]: 4MeSWqsVD1zbDYDRn2KZHvizvWfblgpk7jAMf/FtKmcPUrCh4MNimG1UA6uucNq2 Jan 23 08:09:37 np0005593102 certmonger[48030]: by6/upgT4q2Lb78kDYmM1xHxsYt1kjSTmj+lKupkOeq/bmHLsD7Zot3Do8qV8PLi Jan 23 08:09:37 np0005593102 certmonger[48030]: fmtSKE0HmvYMPyB8XPzy8P+gOJenfihGChdo Jan 23 08:09:37 np0005593102 certmonger[48030]: -----END CERTIFICATE----- Jan 23 08:09:37 np0005593102 certmonger[48030]: ". Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Certificate submission still ongoing. Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Certificate submission postprocessing complete. Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Child status = 0. Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Child output: Jan 23 08:09:37 np0005593102 certmonger[38898]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFhzCCA++gAwIBAgIRAJIno3Q1h4LYeCQVx5PuR00wDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAxMjMwODA5MzdaFw0yODAxMjQwODA5MzdaMD8xETAPBgNVBAoM\nCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v\nLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgznGcphpRR6w9\n2zfzbMHfTe+4yLDgjIR7vaKdTb8X/2Lyz6SyXusUqeGxqoDI6IbhWBUEmJuC3HD5\nmNUT3aNBfk0LJxToKKjwXLBdUjRfIxAXejIgltnMbHHckuL1WLPRhllPXyU0A/A5\ng0sfj+0yPo+6h3ljIdRSc/IuKNnDozhBzLvLy+5yHIfEwupEVKiQWoA6a12izEH3\niUwgQ+6835vu78tKmBZ19OiAqbHui/COwN/+fr/xQxVd6Yha9ap78UR+yPQih4DO\nNmUc2ak4CWiX4DKbHN2YU9KtAM+S4hhLaDMCk0E3MLC6EBU2TVH50GAOcevnnji/\nvzUJKdk3AgMBAAGjggIIMIICBDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt\ndyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB\nBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp\ncGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTv\n36tjcZM40iFtMW4bSU0hhqn2vTCB4QYDVR0RBIHZMIHWgiFucDAwMDU1OTMxMDIu\naW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u\ndGVzdKBABgorBgEEAYI3FAIDoDIMMHJlZGlzL25wMDAwNTU5MzEwMi5pbnRlcm5h\nbGFwaS5vb28udGVzdEBPT08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNU\noTUwM6ADAgEBoSwwKhsFcmVkaXMbIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5v\nb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABZ82BSYmWGKyeX2EysW/Hr6gxh+L\nuEsLTEHMz62THviXjs8/E3LeiveSRYtAk/lgyRpm8LAFvBok7S1lG7ZqPFVSHZ+6\nvIn/a2WrW5P0xS8+n8Wk40fa4gGnjmayJSOC8wP99oouVyxiPdQ8m8h5O5KOmcYf\nseczKruiLepSFwqRC82Vb2KqStBPIokArwEW1OtaEFcFayZR2L6VdZigq2t6nvyq\nEBVp5oTj9JT0jB6Dh749UoLDdvESqTAvUpvEyaHy5eRry7y5p4RKxs5heKKbUdaL\n2/pF1BfYgAbiflk96O8L6uOyGfxIt7W6j6q5Np3KWCdyVoBRGsV+debea+TQn9My\n4MeSWqsVD1zbDYDRn2KZHvizvWfblgpk7jAMf/FtKmcPUrCh4MNimG1UA6uucNq2\nby6/upgT4q2Lb78kDYmM1xHxsYt1kjSTmj+lKupkOeq/bmHLsD7Zot3Do8qV8PLi\nfmtSKE0HmvYMPyB8XPzy8P+gOJenfihGChdo\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:09:37 np0005593102 certmonger[38898]: " Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:09:37 np0005593102 certmonger[38898]: MIIFhzCCA++gAwIBAgIRAJIno3Q1h4LYeCQVx5PuR00wDQYJKoZIhvcNAQELBQAw Jan 23 08:09:37 np0005593102 certmonger[38898]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:09:37 np0005593102 certmonger[38898]: cml0eTAeFw0yNjAxMjMwODA5MzdaFw0yODAxMjQwODA5MzdaMD8xETAPBgNVBAoM Jan 23 08:09:37 np0005593102 certmonger[38898]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDIuaW50ZXJuYWxhcGkub29v Jan 23 08:09:37 np0005593102 certmonger[38898]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgznGcphpRR6w9 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2zfzbMHfTe+4yLDgjIR7vaKdTb8X/2Lyz6SyXusUqeGxqoDI6IbhWBUEmJuC3HD5 Jan 23 08:09:37 np0005593102 certmonger[38898]: mNUT3aNBfk0LJxToKKjwXLBdUjRfIxAXejIgltnMbHHckuL1WLPRhllPXyU0A/A5 Jan 23 08:09:37 np0005593102 certmonger[38898]: g0sfj+0yPo+6h3ljIdRSc/IuKNnDozhBzLvLy+5yHIfEwupEVKiQWoA6a12izEH3 Jan 23 08:09:37 np0005593102 certmonger[38898]: iUwgQ+6835vu78tKmBZ19OiAqbHui/COwN/+fr/xQxVd6Yha9ap78UR+yPQih4DO Jan 23 08:09:37 np0005593102 certmonger[38898]: NmUc2ak4CWiX4DKbHN2YU9KtAM+S4hhLaDMCk0E3MLC6EBU2TVH50GAOcevnnji/ Jan 23 08:09:37 np0005593102 certmonger[38898]: vzUJKdk3AgMBAAGjggIIMIICBDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:09:37 np0005593102 certmonger[38898]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:09:37 np0005593102 certmonger[38898]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:09:37 np0005593102 certmonger[38898]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:09:37 np0005593102 certmonger[38898]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:09:37 np0005593102 certmonger[38898]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTv Jan 23 08:09:37 np0005593102 certmonger[38898]: 36tjcZM40iFtMW4bSU0hhqn2vTCB4QYDVR0RBIHZMIHWgiFucDAwMDU1OTMxMDIu Jan 23 08:09:37 np0005593102 certmonger[38898]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Jan 23 08:09:37 np0005593102 certmonger[38898]: dGVzdKBABgorBgEEAYI3FAIDoDIMMHJlZGlzL25wMDAwNTU5MzEwMi5pbnRlcm5h Jan 23 08:09:37 np0005593102 certmonger[38898]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNU Jan 23 08:09:37 np0005593102 certmonger[38898]: oTUwM6ADAgEBoSwwKhsFcmVkaXMbIW5wMDAwNTU5MzEwMi5pbnRlcm5hbGFwaS5v Jan 23 08:09:37 np0005593102 certmonger[38898]: b28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABZ82BSYmWGKyeX2EysW/Hr6gxh+L Jan 23 08:09:37 np0005593102 certmonger[38898]: uEsLTEHMz62THviXjs8/E3LeiveSRYtAk/lgyRpm8LAFvBok7S1lG7ZqPFVSHZ+6 Jan 23 08:09:37 np0005593102 certmonger[38898]: vIn/a2WrW5P0xS8+n8Wk40fa4gGnjmayJSOC8wP99oouVyxiPdQ8m8h5O5KOmcYf Jan 23 08:09:37 np0005593102 certmonger[38898]: seczKruiLepSFwqRC82Vb2KqStBPIokArwEW1OtaEFcFayZR2L6VdZigq2t6nvyq Jan 23 08:09:37 np0005593102 certmonger[38898]: EBVp5oTj9JT0jB6Dh749UoLDdvESqTAvUpvEyaHy5eRry7y5p4RKxs5heKKbUdaL Jan 23 08:09:37 np0005593102 certmonger[38898]: 2/pF1BfYgAbiflk96O8L6uOyGfxIt7W6j6q5Np3KWCdyVoBRGsV+debea+TQn9My Jan 23 08:09:37 np0005593102 certmonger[38898]: 4MeSWqsVD1zbDYDRn2KZHvizvWfblgpk7jAMf/FtKmcPUrCh4MNimG1UA6uucNq2 Jan 23 08:09:37 np0005593102 certmonger[38898]: by6/upgT4q2Lb78kDYmM1xHxsYt1kjSTmj+lKupkOeq/bmHLsD7Zot3Do8qV8PLi Jan 23 08:09:37 np0005593102 certmonger[38898]: fmtSKE0HmvYMPyB8XPzy8P+gOJenfihGChdo Jan 23 08:09:37 np0005593102 certmonger[38898]: -----END CERTIFICATE----- Jan 23 08:09:37 np0005593102 certmonger[38898]: ". Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] No hooks set for pre-save command. Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:37 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:37 np0005593102 certmonger[48109]: Certificate in file "/etc/pki/tls/certs/redis.crt" issued by CA and saved. Jan 23 08:09:37 np0005593102 certmonger[38898]: 2026-01-23 08:09:37 [38898] Wrote to /var/lib/certmonger/requests/20260123080936 Jan 23 08:09:38 np0005593102 python3[48125]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:09:38 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:40 np0005593102 podman[48126]: 2026-01-23 08:09:38.593812639 +0000 UTC m=+0.046845863 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 08:09:40 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:40 np0005593102 python3[48179]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 cluster.common.tag/redis:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:09:40 np0005593102 podman[48180]: 2026-01-23 08:09:40.797986371 +0000 UTC m=+0.052880007 image tag b9d7c6447d3e11e4b7bc4c1a8872a5471a9020b0347f9e0a44060d9b2823bfe3 cluster.common.tag/redis:pcmklatest Jan 23 08:09:40 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:41 np0005593102 python3[48208]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:09:41 np0005593102 python3[48257]: ansible-ansible.legacy.stat Invoked with path=/etc/rsyslog.d/openstack-swift.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 08:09:42 np0005593102 python3[48300]: ansible-ansible.legacy.copy Invoked with dest=/etc/rsyslog.d/openstack-swift.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155781.4172559-115327-267281430259355/source _original_basename=tmprnr13r0q follow=False checksum=c046f7cecbacf1ea879045a0e157e300a2726c73 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:09:42 np0005593102 python3[48330]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 08:09:42 np0005593102 systemd[1]: Stopping System Logging Service... Jan 23 08:09:43 np0005593102 rsyslogd[39954]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="39954" x-info="https://www.rsyslog.com"] exiting on signal 15. Jan 23 08:09:43 np0005593102 systemd[1]: rsyslog.service: Deactivated successfully. Jan 23 08:09:43 np0005593102 systemd[1]: Stopped System Logging Service. Jan 23 08:09:43 np0005593102 systemd[1]: Starting System Logging Service... Jan 23 08:09:43 np0005593102 rsyslogd[48333]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="48333" x-info="https://www.rsyslog.com"] start Jan 23 08:09:43 np0005593102 systemd[1]: Started System Logging Service. Jan 23 08:09:43 np0005593102 rsyslogd[48333]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 08:09:43 np0005593102 python3[48352]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 08:09:45 np0005593102 ansible-async_wrapper.py[48524]: Invoked with 806462428331 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155784.7495754-115456-111333620397685/AnsiballZ_command.py _ Jan 23 08:09:45 np0005593102 ansible-async_wrapper.py[48527]: Starting module and watcher Jan 23 08:09:45 np0005593102 ansible-async_wrapper.py[48527]: Start watching 48528 (3600) Jan 23 08:09:45 np0005593102 ansible-async_wrapper.py[48528]: Start module (48528) Jan 23 08:09:45 np0005593102 ansible-async_wrapper.py[48524]: Return async_wrapper task started. Jan 23 08:09:45 np0005593102 python3[48548]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:09:50 np0005593102 sshd[48620]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:09:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3600) Jan 23 08:09:50 np0005593102 puppet-user[48532]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 08:09:50 np0005593102 puppet-user[48532]: (file: /etc/puppet/hiera.yaml) Jan 23 08:09:50 np0005593102 puppet-user[48532]: Warning: Undefined variable '::deploy_config_name'; Jan 23 08:09:50 np0005593102 puppet-user[48532]: (file & line not available) Jan 23 08:09:50 np0005593102 puppet-user[48532]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 08:09:50 np0005593102 puppet-user[48532]: (file & line not available) Jan 23 08:09:50 np0005593102 puppet-user[48532]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Jan 23 08:09:51 np0005593102 puppet-user[48532]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Jan 23 08:09:51 np0005593102 puppet-user[48532]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.39 seconds Jan 23 08:09:51 np0005593102 sssd_nss[38598]: Enumeration requested but not enabled Jan 23 08:09:51 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Exec[directory-create-etc-my.cnf.d]/returns: executed successfully Jan 23 08:09:51 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 08:09:51 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 08:09:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3595) Jan 23 08:09:56 np0005593102 python3[48691]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3590) Jan 23 08:10:02 np0005593102 dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Jan 23 08:10:02 np0005593102 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 08:10:02 np0005593102 systemd[1]: Starting man-db-cache-update.service... Jan 23 08:10:02 np0005593102 systemd[1]: Reloading. Jan 23 08:10:02 np0005593102 systemd-rc-local-generator[48840]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:02 np0005593102 systemd-sysv-generator[48846]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:02 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:02 np0005593102 systemd[1]: Starting dnf makecache... Jan 23 08:10:02 np0005593102 systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 08:10:03 np0005593102 dnf[49239]: Updating Subscription Management repositories. Jan 23 08:10:04 np0005593102 systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 08:10:04 np0005593102 systemd[1]: Finished man-db-cache-update.service. Jan 23 08:10:04 np0005593102 systemd[1]: man-db-cache-update.service: Consumed 1.273s CPU time. Jan 23 08:10:04 np0005593102 systemd[1]: run-r3cb66dd5c604419db641781e5c18175e.service: Deactivated successfully. Jan 23 08:10:04 np0005593102 rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 08:10:04 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Pacemaker::Install/Package[pacemaker]/ensure: created Jan 23 08:10:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3585) Jan 23 08:10:05 np0005593102 dnf[49239]: Metadata cache refreshed recently. Jan 23 08:10:05 np0005593102 systemd[1]: dnf-makecache.service: Deactivated successfully. Jan 23 08:10:05 np0005593102 systemd[1]: Finished dnf makecache. Jan 23 08:10:05 np0005593102 systemd[1]: dnf-makecache.service: Consumed 2.164s CPU time. Jan 23 08:10:06 np0005593102 python3[50821]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3580) Jan 23 08:10:11 np0005593102 systemd[1]: Reloading. Jan 23 08:10:11 np0005593102 systemd-sysv-generator[50869]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:11 np0005593102 systemd-rc-local-generator[50865]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:11 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:11 np0005593102 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 08:10:11 np0005593102 systemd[1]: Starting man-db-cache-update.service... Jan 23 08:10:11 np0005593102 systemd[1]: Reloading. Jan 23 08:10:11 np0005593102 systemd-sysv-generator[50917]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:11 np0005593102 systemd-rc-local-generator[50914]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:11 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:11 np0005593102 systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 08:10:12 np0005593102 systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 08:10:12 np0005593102 systemd[1]: Finished man-db-cache-update.service. Jan 23 08:10:12 np0005593102 systemd[1]: run-r3cfb6ccc21c94d1e90b9eae84557c730.service: Deactivated successfully. Jan 23 08:10:13 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Pacemaker::Install/Package[pcs]/ensure: created Jan 23 08:10:13 np0005593102 systemd[1]: Reloading. Jan 23 08:10:13 np0005593102 systemd-rc-local-generator[51037]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:13 np0005593102 systemd-sysv-generator[51043]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:13 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:13 np0005593102 systemd[1]: Reloading. Jan 23 08:10:13 np0005593102 systemd-rc-local-generator[51079]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:13 np0005593102 systemd-sysv-generator[51084]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:13 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:13 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Pacemaker::Service/Service[corosync]/enable: enable changed 'false' to 'true' Jan 23 08:10:13 np0005593102 systemd[1]: Reloading. Jan 23 08:10:13 np0005593102 systemd-rc-local-generator[51117]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:13 np0005593102 systemd-sysv-generator[51121]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:13 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:13 np0005593102 systemd[1]: Reloading. Jan 23 08:10:13 np0005593102 systemd-rc-local-generator[51150]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:13 np0005593102 systemd-sysv-generator[51155]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:14 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:14 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Pacemaker::Service/Service[pacemaker]/enable: enable changed 'false' to 'true' Jan 23 08:10:14 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Pacemaker::Corosync/File_line[pcsd_bind_addr]/ensure: created Jan 23 08:10:14 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/password: changed [redacted] to [redacted] Jan 23 08:10:14 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/groups: groups changed to ['haclient'] Jan 23 08:10:14 np0005593102 systemd[1]: Reloading. Jan 23 08:10:14 np0005593102 systemd-sysv-generator[51203]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:14 np0005593102 systemd-rc-local-generator[51200]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:14 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:14 np0005593102 systemd[1]: Starting PCS GUI and remote configuration interface (Ruby)... Jan 23 08:10:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3575) Jan 23 08:10:15 np0005593102 pcsd[51215]: 2026-01-23 08:10:15 +0000 INFO Notifying systemd we are running (socket /run/systemd/notify) Jan 23 08:10:15 np0005593102 systemd[1]: Started PCS GUI and remote configuration interface (Ruby). Jan 23 08:10:15 np0005593102 systemd[1]: Starting PCS GUI and remote configuration interface... Jan 23 08:10:16 np0005593102 python3[51260]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:16 np0005593102 systemd[1]: Started PCS GUI and remote configuration interface. Jan 23 08:10:16 np0005593102 systemd[1]: Reloading. Jan 23 08:10:16 np0005593102 systemd-sysv-generator[51355]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:16 np0005593102 systemd-rc-local-generator[51352]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:16 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:17 np0005593102 systemd[1]: Reloading. Jan 23 08:10:17 np0005593102 systemd-sysv-generator[51395]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:17 np0005593102 systemd-rc-local-generator[51392]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:17 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:17 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Pacemaker::Service/Service[pcsd]/ensure: ensure changed 'stopped' to 'running' Jan 23 08:10:17 np0005593102 puppet-user[48532]: Notice: /Stage[main]/Pacemaker::Corosync/Exec[check-for-local-authentication]/returns: executed successfully Jan 23 08:10:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3570) Jan 23 08:10:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3565) Jan 23 08:10:26 np0005593102 python3[51444]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:28 np0005593102 sshd[51445]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:10:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3560) Jan 23 08:10:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3555) Jan 23 08:10:37 np0005593102 python3[51479]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3550) Jan 23 08:10:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3545) Jan 23 08:10:47 np0005593102 python3[51512]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3540) Jan 23 08:10:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3535) Jan 23 08:10:57 np0005593102 python3[51545]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3530) Jan 23 08:11:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3525) Jan 23 08:11:08 np0005593102 python3[51578]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3520) Jan 23 08:11:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3515) Jan 23 08:11:18 np0005593102 python3[51611]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3510) Jan 23 08:11:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3505) Jan 23 08:11:28 np0005593102 python3[51644]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3500) Jan 23 08:11:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3495) Jan 23 08:11:38 np0005593102 python3[51674]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3490) Jan 23 08:11:42 np0005593102 sshd[51678]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:11:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3485) Jan 23 08:11:49 np0005593102 python3[51752]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3480) Jan 23 08:11:51 np0005593102 rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 08:11:51 np0005593102 rhsm-service[6575]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 08:11:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3475) Jan 23 08:11:59 np0005593102 python3[51921]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3470) Jan 23 08:12:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3465) Jan 23 08:12:09 np0005593102 python3[51946]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3460) Jan 23 08:12:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3455) Jan 23 08:12:20 np0005593102 python3[51975]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3450) Jan 23 08:12:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3445) Jan 23 08:12:30 np0005593102 python3[52008]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3440) Jan 23 08:12:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3435) Jan 23 08:12:36 np0005593102 sshd[52026]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:12:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3430) Jan 23 08:12:40 np0005593102 python3[52044]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3425) Jan 23 08:12:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3420) Jan 23 08:12:51 np0005593102 python3[52077]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3415) Jan 23 08:13:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3410) Jan 23 08:13:01 np0005593102 python3[52110]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3405) Jan 23 08:13:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3400) Jan 23 08:13:11 np0005593102 python3[52143]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3395) Jan 23 08:13:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3390) Jan 23 08:13:21 np0005593102 python3[52176]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3385) Jan 23 08:13:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3380) Jan 23 08:13:32 np0005593102 python3[52209]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3375) Jan 23 08:13:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3370) Jan 23 08:13:41 np0005593102 sshd[52224]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:13:42 np0005593102 python3[52244]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3365) Jan 23 08:13:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3360) Jan 23 08:13:52 np0005593102 python3[52274]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3355) Jan 23 08:14:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3350) Jan 23 08:14:03 np0005593102 python3[52307]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3345) Jan 23 08:14:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3340) Jan 23 08:14:13 np0005593102 python3[52340]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3335) Jan 23 08:14:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3330) Jan 23 08:14:23 np0005593102 python3[52363]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3325) Jan 23 08:14:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3320) Jan 23 08:14:33 np0005593102 python3[52392]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3315) Jan 23 08:14:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3310) Jan 23 08:14:44 np0005593102 python3[52425]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3305) Jan 23 08:14:46 np0005593102 sshd[52440]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:14:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3300) Jan 23 08:14:54 np0005593102 python3[52461]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3295) Jan 23 08:15:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3290) Jan 23 08:15:04 np0005593102 python3[52494]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3285) Jan 23 08:15:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3280) Jan 23 08:15:15 np0005593102 python3[52528]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3275) Jan 23 08:15:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3270) Jan 23 08:15:25 np0005593102 python3[52561]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3265) Jan 23 08:15:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3260) Jan 23 08:15:34 np0005593102 sshd[52579]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:15:35 np0005593102 python3[52596]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3255) Jan 23 08:15:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3250) Jan 23 08:15:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3245) Jan 23 08:15:45 np0005593102 python3[52629]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3240) Jan 23 08:15:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3235) Jan 23 08:15:56 np0005593102 python3[52659]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3230) Jan 23 08:16:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3225) Jan 23 08:16:06 np0005593102 python3[52692]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3220) Jan 23 08:16:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3215) Jan 23 08:16:16 np0005593102 python3[52725]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3210) Jan 23 08:16:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3205) Jan 23 08:16:27 np0005593102 python3[52758]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3200) Jan 23 08:16:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3195) Jan 23 08:16:37 np0005593102 python3[52782]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3190) Jan 23 08:16:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3185) Jan 23 08:16:47 np0005593102 python3[52811]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3180) Jan 23 08:16:54 np0005593102 sshd[52829]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:16:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3175) Jan 23 08:16:57 np0005593102 python3[52847]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3170) Jan 23 08:17:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3165) Jan 23 08:17:08 np0005593102 python3[52880]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3160) Jan 23 08:17:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3155) Jan 23 08:17:18 np0005593102 python3[52913]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:20 np0005593102 sshd[52914]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:17:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3150) Jan 23 08:17:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3145) Jan 23 08:17:28 np0005593102 python3[52948]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3140) Jan 23 08:17:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3135) Jan 23 08:17:39 np0005593102 python3[52981]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3130) Jan 23 08:17:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3125) Jan 23 08:17:49 np0005593102 python3[53015]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3120) Jan 23 08:17:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3115) Jan 23 08:17:59 np0005593102 python3[53048]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3110) Jan 23 08:18:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3105) Jan 23 08:18:10 np0005593102 python3[53078]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3100) Jan 23 08:18:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3095) Jan 23 08:18:20 np0005593102 python3[53111]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3090) Jan 23 08:18:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3085) Jan 23 08:18:30 np0005593102 python3[53144]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3080) Jan 23 08:18:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3075) Jan 23 08:18:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3070) Jan 23 08:18:40 np0005593102 python3[53177]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3065) Jan 23 08:18:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3060) Jan 23 08:18:51 np0005593102 python3[53210]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3055) Jan 23 08:19:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3050) Jan 23 08:19:01 np0005593102 python3[53231]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3045) Jan 23 08:19:07 np0005593102 sshd[53247]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:19:08 np0005593102 sshd[53250]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:19:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3040) Jan 23 08:19:11 np0005593102 python3[53267]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:15 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3035) Jan 23 08:19:20 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3030) Jan 23 08:19:22 np0005593102 python3[53300]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:25 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3025) Jan 23 08:19:30 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3020) Jan 23 08:19:32 np0005593102 python3[53333]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:35 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3015) Jan 23 08:19:40 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3010) Jan 23 08:19:42 np0005593102 python3[53366]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:45 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3005) Jan 23 08:19:50 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (3000) Jan 23 08:19:53 np0005593102 python3[53399]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:55 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2995) Jan 23 08:20:00 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2990) Jan 23 08:20:03 np0005593102 python3[53432]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:05 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2985) Jan 23 08:20:10 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2980) Jan 23 08:20:13 np0005593102 python3[53466]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2975) Jan 23 08:20:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2970) Jan 23 08:20:24 np0005593102 python3[53499]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2965) Jan 23 08:20:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2960) Jan 23 08:20:34 np0005593102 python3[53529]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2955) Jan 23 08:20:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2950) Jan 23 08:20:44 np0005593102 python3[53562]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2945) Jan 23 08:20:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2940) Jan 23 08:20:55 np0005593102 python3[53595]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2935) Jan 23 08:20:59 np0005593102 sshd[53599]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:21:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2930) Jan 23 08:21:05 np0005593102 python3[53630]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2925) Jan 23 08:21:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2920) Jan 23 08:21:15 np0005593102 python3[53662]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2915) Jan 23 08:21:16 np0005593102 sshd[53664]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:21:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2910) Jan 23 08:21:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2905) Jan 23 08:21:26 np0005593102 python3[53687]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2900) Jan 23 08:21:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2895) Jan 23 08:21:36 np0005593102 python3[53718]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2890) Jan 23 08:21:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2885) Jan 23 08:21:46 np0005593102 python3[53751]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2880) Jan 23 08:21:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2875) Jan 23 08:21:57 np0005593102 python3[53784]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2870) Jan 23 08:22:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2865) Jan 23 08:22:07 np0005593102 python3[53817]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2860) Jan 23 08:22:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2855) Jan 23 08:22:17 np0005593102 python3[53850]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2850) Jan 23 08:22:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2845) Jan 23 08:22:28 np0005593102 python3[53883]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2840) Jan 23 08:22:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2835) Jan 23 08:22:38 np0005593102 python3[53916]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2830) Jan 23 08:22:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2825) Jan 23 08:22:48 np0005593102 python3[53946]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2820) Jan 23 08:22:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2815) Jan 23 08:22:58 np0005593102 python3[53979]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2810) Jan 23 08:23:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2805) Jan 23 08:23:09 np0005593102 python3[54012]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2800) Jan 23 08:23:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2795) Jan 23 08:23:19 np0005593102 python3[54045]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2790) Jan 23 08:23:24 np0005593102 sshd[54049]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:23:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2785) Jan 23 08:23:29 np0005593102 python3[54081]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2780) Jan 23 08:23:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2775) Jan 23 08:23:40 np0005593102 python3[54102]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2770) Jan 23 08:23:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2765) Jan 23 08:23:50 np0005593102 python3[54133]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2760) Jan 23 08:23:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2755) Jan 23 08:24:00 np0005593102 python3[54166]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2750) Jan 23 08:24:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2745) Jan 23 08:24:11 np0005593102 python3[54199]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2740) Jan 23 08:24:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2735) Jan 23 08:24:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2730) Jan 23 08:24:21 np0005593102 python3[54232]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2725) Jan 23 08:24:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2720) Jan 23 08:24:31 np0005593102 python3[54265]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2715) Jan 23 08:24:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2710) Jan 23 08:24:41 np0005593102 python3[54298]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2705) Jan 23 08:24:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2700) Jan 23 08:24:52 np0005593102 python3[54331]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2695) Jan 23 08:25:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2690) Jan 23 08:25:02 np0005593102 python3[54364]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2685) Jan 23 08:25:06 np0005593102 sshd[54365]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:25:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2680) Jan 23 08:25:12 np0005593102 python3[54395]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2675) Jan 23 08:25:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2670) Jan 23 08:25:23 np0005593102 python3[54428]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2665) Jan 23 08:25:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2660) Jan 23 08:25:33 np0005593102 python3[54461]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2655) Jan 23 08:25:38 np0005593102 sshd[54466]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:25:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2650) Jan 23 08:25:43 np0005593102 python3[54497]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2645) Jan 23 08:25:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2640) Jan 23 08:25:53 np0005593102 python3[54520]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2635) Jan 23 08:26:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2630) Jan 23 08:26:02 np0005593102 systemd[1]: session-14.scope: Deactivated successfully. Jan 23 08:26:02 np0005593102 systemd[1]: session-14.scope: Consumed 3.002s CPU time. Jan 23 08:26:02 np0005593102 systemd-logind[36347]: Session 14 logged out. Waiting for processes to exit. Jan 23 08:26:02 np0005593102 systemd-logind[36347]: Removed session 14. Jan 23 08:26:04 np0005593102 python3[54551]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2625) Jan 23 08:26:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2620) Jan 23 08:26:12 np0005593102 systemd[1]: Stopping User Manager for UID 1000... Jan 23 08:26:12 np0005593102 systemd[4178]: Activating special unit Exit the Session... Jan 23 08:26:12 np0005593102 systemd[4178]: Stopping podman-pause-4487c0b8.scope... Jan 23 08:26:12 np0005593102 systemd[4178]: Removed slice User Background Tasks Slice. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped target Main User Target. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped target Basic System. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped target Paths. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped target Sockets. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped target Timers. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped Mark boot as successful after the user session has run 2 minutes. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped Daily Cleanup of User's Temporary Directories. Jan 23 08:26:12 np0005593102 dbus-broker[18431]: Dispatched 3266 messages @ 1(±17)μs / message. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopping D-Bus User Message Bus... Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped Create User's Volatile Files and Directories. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped podman-pause-4487c0b8.scope. Jan 23 08:26:12 np0005593102 systemd[4178]: Removed slice Slice /user. Jan 23 08:26:12 np0005593102 systemd[4178]: Stopped D-Bus User Message Bus. Jan 23 08:26:12 np0005593102 systemd[4178]: Closed D-Bus User Message Bus Socket. Jan 23 08:26:12 np0005593102 systemd[4178]: Removed slice User Application Slice. Jan 23 08:26:12 np0005593102 systemd[4178]: Reached target Shutdown. Jan 23 08:26:12 np0005593102 systemd[4178]: Finished Exit the Session. Jan 23 08:26:12 np0005593102 systemd[4178]: Reached target Exit the Session. Jan 23 08:26:12 np0005593102 systemd[1]: user@1000.service: Deactivated successfully. Jan 23 08:26:12 np0005593102 systemd[1]: Stopped User Manager for UID 1000. Jan 23 08:26:12 np0005593102 systemd[1]: user@1000.service: Consumed 1.496s CPU time, read 20.0K from disk, written 4.0K to disk. Jan 23 08:26:14 np0005593102 python3[54586]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2615) Jan 23 08:26:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2610) Jan 23 08:26:24 np0005593102 python3[54619]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2605) Jan 23 08:26:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2600) Jan 23 08:26:35 np0005593102 python3[54652]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2595) Jan 23 08:26:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2590) Jan 23 08:26:45 np0005593102 python3[54685]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2585) Jan 23 08:26:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2580) Jan 23 08:26:55 np0005593102 python3[54718]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2575) Jan 23 08:27:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2570) Jan 23 08:27:06 np0005593102 python3[54751]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2565) Jan 23 08:27:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2560) Jan 23 08:27:16 np0005593102 python3[54784]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2555) Jan 23 08:27:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2550) Jan 23 08:27:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2545) Jan 23 08:27:26 np0005593102 python3[54814]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2540) Jan 23 08:27:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2535) Jan 23 08:27:36 np0005593102 python3[54847]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2530) Jan 23 08:27:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2525) Jan 23 08:27:47 np0005593102 python3[54880]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:49 np0005593102 sshd[54884]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:27:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2520) Jan 23 08:27:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2515) Jan 23 08:27:57 np0005593102 python3[54915]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2510) Jan 23 08:28:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2505) Jan 23 08:28:07 np0005593102 python3[54948]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2500) Jan 23 08:28:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2495) Jan 23 08:28:18 np0005593102 python3[54969]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2490) Jan 23 08:28:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2485) Jan 23 08:28:28 np0005593102 python3[55000]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2480) Jan 23 08:28:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2475) Jan 23 08:28:38 np0005593102 python3[55033]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2470) Jan 23 08:28:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2465) Jan 23 08:28:49 np0005593102 python3[55066]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2460) Jan 23 08:28:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2455) Jan 23 08:28:59 np0005593102 python3[55099]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2450) Jan 23 08:29:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2445) Jan 23 08:29:09 np0005593102 python3[55132]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2440) Jan 23 08:29:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2435) Jan 23 08:29:19 np0005593102 python3[55165]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2430) Jan 23 08:29:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2425) Jan 23 08:29:30 np0005593102 python3[55198]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2420) Jan 23 08:29:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2415) Jan 23 08:29:40 np0005593102 python3[55231]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2410) Jan 23 08:29:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2405) Jan 23 08:29:50 np0005593102 python3[55261]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2400) Jan 23 08:29:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2395) Jan 23 08:29:57 np0005593102 sshd[55265]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:30:01 np0005593102 python3[55297]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2390) Jan 23 08:30:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2385) Jan 23 08:30:11 np0005593102 python3[55330]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2380) Jan 23 08:30:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2375) Jan 23 08:30:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2370) Jan 23 08:30:21 np0005593102 python3[55363]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2365) Jan 23 08:30:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2360) Jan 23 08:30:32 np0005593102 python3[55386]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2355) Jan 23 08:30:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2350) Jan 23 08:30:42 np0005593102 python3[55415]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2345) Jan 23 08:30:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2340) Jan 23 08:30:52 np0005593102 python3[55448]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2335) Jan 23 08:31:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2330) Jan 23 08:31:03 np0005593102 python3[55481]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2325) Jan 23 08:31:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2320) Jan 23 08:31:13 np0005593102 python3[55515]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2315) Jan 23 08:31:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2310) Jan 23 08:31:23 np0005593102 python3[55548]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2305) Jan 23 08:31:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2300) Jan 23 08:31:33 np0005593102 python3[55581]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2295) Jan 23 08:31:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2290) Jan 23 08:31:44 np0005593102 python3[55614]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2285) Jan 23 08:31:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2280) Jan 23 08:31:54 np0005593102 python3[55647]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2275) Jan 23 08:32:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2270) Jan 23 08:32:04 np0005593102 python3[55677]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2265) Jan 23 08:32:08 np0005593102 sshd[55681]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:32:11 np0005593102 krb5_child[55684]: Preauthentication failed Jan 23 08:32:11 np0005593102 krb5_child[55684]: Preauthentication failed Jan 23 08:32:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2260) Jan 23 08:32:15 np0005593102 python3[55714]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2255) Jan 23 08:32:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2250) Jan 23 08:32:25 np0005593102 python3[55747]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2245) Jan 23 08:32:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2240) Jan 23 08:32:35 np0005593102 python3[55780]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2235) Jan 23 08:32:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2230) Jan 23 08:32:45 np0005593102 sshd[55784]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:32:45 np0005593102 python3[55805]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2225) Jan 23 08:32:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2220) Jan 23 08:32:56 np0005593102 python3[55835]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2215) Jan 23 08:33:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2210) Jan 23 08:33:06 np0005593102 python3[55868]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2205) Jan 23 08:33:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2200) Jan 23 08:33:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2195) Jan 23 08:33:16 np0005593102 python3[55901]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2190) Jan 23 08:33:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2185) Jan 23 08:33:27 np0005593102 python3[55934]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2180) Jan 23 08:33:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2175) Jan 23 08:33:37 np0005593102 python3[55967]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2170) Jan 23 08:33:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2165) Jan 23 08:33:47 np0005593102 python3[56000]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2160) Jan 23 08:33:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2155) Jan 23 08:33:58 np0005593102 python3[56033]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2150) Jan 23 08:34:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2145) Jan 23 08:34:08 np0005593102 python3[56066]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2140) Jan 23 08:34:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2135) Jan 23 08:34:17 np0005593102 sshd[56081]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:34:18 np0005593102 python3[56100]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2130) Jan 23 08:34:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2125) Jan 23 08:34:28 np0005593102 python3[56131]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2120) Jan 23 08:34:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2115) Jan 23 08:34:39 np0005593102 python3[56164]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2110) Jan 23 08:34:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2105) Jan 23 08:34:49 np0005593102 python3[56197]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2100) Jan 23 08:34:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2095) Jan 23 08:34:59 np0005593102 python3[56218]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2090) Jan 23 08:35:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2085) Jan 23 08:35:10 np0005593102 python3[56249]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2080) Jan 23 08:35:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2075) Jan 23 08:35:20 np0005593102 python3[56282]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2070) Jan 23 08:35:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2065) Jan 23 08:35:30 np0005593102 python3[56315]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2060) Jan 23 08:35:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2055) Jan 23 08:35:40 np0005593102 python3[56348]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2050) Jan 23 08:35:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2045) Jan 23 08:35:51 np0005593102 python3[56381]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2040) Jan 23 08:35:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2035) Jan 23 08:36:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2030) Jan 23 08:36:02 np0005593102 python3[56414]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2025) Jan 23 08:36:11 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2020) Jan 23 08:36:12 np0005593102 python3[56447]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:16 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2015) Jan 23 08:36:21 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2010) Jan 23 08:36:23 np0005593102 python3[56480]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:25 np0005593102 sshd[56481]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:36:26 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2005) Jan 23 08:36:31 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (2000) Jan 23 08:36:33 np0005593102 python3[56517]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:36 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1995) Jan 23 08:36:41 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1990) Jan 23 08:36:43 np0005593102 python3[56550]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:46 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1985) Jan 23 08:36:51 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1980) Jan 23 08:36:53 np0005593102 python3[56581]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:56 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1975) Jan 23 08:37:01 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1970) Jan 23 08:37:04 np0005593102 python3[56614]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:06 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1965) Jan 23 08:37:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1960) Jan 23 08:37:14 np0005593102 python3[56647]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1955) Jan 23 08:37:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1950) Jan 23 08:37:24 np0005593102 python3[56670]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1945) Jan 23 08:37:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1940) Jan 23 08:37:35 np0005593102 python3[56699]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1935) Jan 23 08:37:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1930) Jan 23 08:37:45 np0005593102 python3[56732]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1925) Jan 23 08:37:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1920) Jan 23 08:37:55 np0005593102 python3[56765]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:57 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1915) Jan 23 08:38:02 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1910) Jan 23 08:38:05 np0005593102 python3[56798]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:07 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1905) Jan 23 08:38:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1900) Jan 23 08:38:16 np0005593102 python3[56831]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1895) Jan 23 08:38:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1890) Jan 23 08:38:26 np0005593102 python3[56864]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1885) Jan 23 08:38:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1880) Jan 23 08:38:34 np0005593102 sshd[56879]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:38:34 np0005593102 sshd[56881]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:38:34 np0005593102 krb5_child[56886]: Preauthentication failed Jan 23 08:38:34 np0005593102 krb5_child[56886]: Preauthentication failed Jan 23 08:38:36 np0005593102 python3[56903]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1875) Jan 23 08:38:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1870) Jan 23 08:38:47 np0005593102 python3[56937]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1865) Jan 23 08:38:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1860) Jan 23 08:38:57 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1855) Jan 23 08:38:57 np0005593102 python3[56970]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:02 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1850) Jan 23 08:39:07 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1845) Jan 23 08:39:07 np0005593102 python3[57000]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1840) Jan 23 08:39:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1835) Jan 23 08:39:17 np0005593102 python3[57033]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1830) Jan 23 08:39:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1825) Jan 23 08:39:28 np0005593102 python3[57066]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1820) Jan 23 08:39:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1815) Jan 23 08:39:38 np0005593102 python3[57089]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1810) Jan 23 08:39:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1805) Jan 23 08:39:48 np0005593102 python3[57119]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1800) Jan 23 08:39:57 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1795) Jan 23 08:39:59 np0005593102 python3[57152]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:02 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1790) Jan 23 08:40:07 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1785) Jan 23 08:40:09 np0005593102 python3[57185]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1780) Jan 23 08:40:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1775) Jan 23 08:40:19 np0005593102 python3[57218]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1770) Jan 23 08:40:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1765) Jan 23 08:40:30 np0005593102 python3[57251]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1760) Jan 23 08:40:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1755) Jan 23 08:40:40 np0005593102 python3[57284]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1750) Jan 23 08:40:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1745) Jan 23 08:40:50 np0005593102 python3[57317]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1740) Jan 23 08:40:52 np0005593102 sshd[57318]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:40:55 np0005593102 krb5_child[57321]: Preauthentication failed Jan 23 08:40:55 np0005593102 krb5_child[57321]: Preauthentication failed Jan 23 08:40:57 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1735) Jan 23 08:41:01 np0005593102 python3[57354]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:02 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1730) Jan 23 08:41:07 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1725) Jan 23 08:41:11 np0005593102 python3[57387]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1720) Jan 23 08:41:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1715) Jan 23 08:41:21 np0005593102 python3[57420]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1710) Jan 23 08:41:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1705) Jan 23 08:41:28 np0005593102 sshd[57421]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:41:31 np0005593102 python3[57451]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1700) Jan 23 08:41:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1695) Jan 23 08:41:42 np0005593102 python3[57484]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1690) Jan 23 08:41:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1685) Jan 23 08:41:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1680) Jan 23 08:41:52 np0005593102 python3[57514]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:57 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1675) Jan 23 08:42:02 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1670) Jan 23 08:42:02 np0005593102 python3[57536]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:07 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1665) Jan 23 08:42:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1660) Jan 23 08:42:13 np0005593102 python3[57569]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1655) Jan 23 08:42:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1650) Jan 23 08:42:23 np0005593102 python3[57602]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1645) Jan 23 08:42:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1640) Jan 23 08:42:33 np0005593102 python3[57635]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1635) Jan 23 08:42:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1630) Jan 23 08:42:43 np0005593102 python3[57668]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1625) Jan 23 08:42:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1620) Jan 23 08:42:54 np0005593102 python3[57702]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:57 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1615) Jan 23 08:43:02 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1610) Jan 23 08:43:03 np0005593102 sshd[57720]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:43:04 np0005593102 python3[57737]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:07 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1605) Jan 23 08:43:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1600) Jan 23 08:43:14 np0005593102 python3[57771]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1595) Jan 23 08:43:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1590) Jan 23 08:43:25 np0005593102 python3[57804]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1585) Jan 23 08:43:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1580) Jan 23 08:43:35 np0005593102 python3[57837]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1575) Jan 23 08:43:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1570) Jan 23 08:43:45 np0005593102 python3[57867]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1565) Jan 23 08:43:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1560) Jan 23 08:43:56 np0005593102 python3[57900]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:57 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1555) Jan 23 08:44:02 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1550) Jan 23 08:44:06 np0005593102 python3[57933]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:07 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1545) Jan 23 08:44:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1540) Jan 23 08:44:16 np0005593102 python3[57954]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1535) Jan 23 08:44:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1530) Jan 23 08:44:26 np0005593102 python3[57985]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1525) Jan 23 08:44:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1520) Jan 23 08:44:37 np0005593102 python3[58018]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1515) Jan 23 08:44:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1510) Jan 23 08:44:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1505) Jan 23 08:44:47 np0005593102 python3[58051]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1500) Jan 23 08:44:57 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1495) Jan 23 08:44:57 np0005593102 python3[58084]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:02 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1490) Jan 23 08:45:07 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1485) Jan 23 08:45:08 np0005593102 python3[58117]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1480) Jan 23 08:45:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1475) Jan 23 08:45:17 np0005593102 sshd[58135]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:45:18 np0005593102 python3[58152]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1470) Jan 23 08:45:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1465) Jan 23 08:45:28 np0005593102 python3[58186]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1460) Jan 23 08:45:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1455) Jan 23 08:45:39 np0005593102 python3[58219]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1450) Jan 23 08:45:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1445) Jan 23 08:45:49 np0005593102 python3[58252]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1440) Jan 23 08:45:57 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1435) Jan 23 08:45:59 np0005593102 python3[58282]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:02 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1430) Jan 23 08:46:07 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1425) Jan 23 08:46:09 np0005593102 python3[58315]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:12 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1420) Jan 23 08:46:17 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1415) Jan 23 08:46:20 np0005593102 python3[58348]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:22 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1410) Jan 23 08:46:27 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1405) Jan 23 08:46:30 np0005593102 python3[58369]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:32 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1400) Jan 23 08:46:37 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1395) Jan 23 08:46:40 np0005593102 python3[58400]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:42 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1390) Jan 23 08:46:47 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1385) Jan 23 08:46:50 np0005593102 python3[58433]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:52 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1380) Jan 23 08:46:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1375) Jan 23 08:47:01 np0005593102 python3[58466]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1370) Jan 23 08:47:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1365) Jan 23 08:47:11 np0005593102 python3[58499]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1360) Jan 23 08:47:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1355) Jan 23 08:47:21 np0005593102 python3[58532]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1350) Jan 23 08:47:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1345) Jan 23 08:47:30 np0005593102 sshd[58550]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:47:32 np0005593102 python3[58567]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1340) Jan 23 08:47:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1335) Jan 23 08:47:42 np0005593102 python3[58601]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1330) Jan 23 08:47:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1325) Jan 23 08:47:52 np0005593102 python3[58635]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1320) Jan 23 08:47:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1315) Jan 23 08:48:03 np0005593102 python3[58669]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1310) Jan 23 08:48:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1305) Jan 23 08:48:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1300) Jan 23 08:48:13 np0005593102 python3[58699]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1295) Jan 23 08:48:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1290) Jan 23 08:48:23 np0005593102 python3[58732]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1285) Jan 23 08:48:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1280) Jan 23 08:48:33 np0005593102 python3[58765]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1275) Jan 23 08:48:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1270) Jan 23 08:48:44 np0005593102 python3[58786]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1265) Jan 23 08:48:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1260) Jan 23 08:48:54 np0005593102 python3[58817]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1255) Jan 23 08:49:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1250) Jan 23 08:49:04 np0005593102 python3[58850]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1245) Jan 23 08:49:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1240) Jan 23 08:49:15 np0005593102 python3[58883]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1235) Jan 23 08:49:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1230) Jan 23 08:49:25 np0005593102 python3[58916]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1225) Jan 23 08:49:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1220) Jan 23 08:49:35 np0005593102 python3[58949]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1215) Jan 23 08:49:40 np0005593102 sshd[58962]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:49:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1210) Jan 23 08:49:46 np0005593102 python3[58985]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1205) Jan 23 08:49:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1200) Jan 23 08:49:56 np0005593102 python3[59018]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1195) Jan 23 08:50:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1190) Jan 23 08:50:06 np0005593102 python3[59051]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1185) Jan 23 08:50:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1180) Jan 23 08:50:16 np0005593102 python3[59081]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1175) Jan 23 08:50:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1170) Jan 23 08:50:27 np0005593102 python3[59114]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1165) Jan 23 08:50:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1160) Jan 23 08:50:37 np0005593102 python3[59147]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1155) Jan 23 08:50:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1150) Jan 23 08:50:47 np0005593102 python3[59180]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1145) Jan 23 08:50:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1140) Jan 23 08:50:58 np0005593102 python3[59201]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1135) Jan 23 08:51:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1130) Jan 23 08:51:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1125) Jan 23 08:51:08 np0005593102 python3[59232]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1120) Jan 23 08:51:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1115) Jan 23 08:51:18 np0005593102 python3[59265]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1110) Jan 23 08:51:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1105) Jan 23 08:51:29 np0005593102 python3[59299]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1100) Jan 23 08:51:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1095) Jan 23 08:51:39 np0005593102 python3[59332]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1090) Jan 23 08:51:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1085) Jan 23 08:51:49 np0005593102 python3[59365]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1080) Jan 23 08:51:55 np0005593102 sshd[59380]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:51:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1075) Jan 23 08:51:59 np0005593102 python3[59401]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1070) Jan 23 08:52:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1065) Jan 23 08:52:10 np0005593102 python3[59434]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1060) Jan 23 08:52:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1055) Jan 23 08:52:20 np0005593102 python3[59467]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1050) Jan 23 08:52:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1045) Jan 23 08:52:30 np0005593102 python3[59497]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1040) Jan 23 08:52:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1035) Jan 23 08:52:41 np0005593102 python3[59530]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1030) Jan 23 08:52:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1025) Jan 23 08:52:51 np0005593102 python3[59563]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1020) Jan 23 08:52:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1015) Jan 23 08:53:01 np0005593102 python3[59596]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1010) Jan 23 08:53:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1005) Jan 23 08:53:11 np0005593102 python3[59617]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (1000) Jan 23 08:53:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (995) Jan 23 08:53:22 np0005593102 python3[59648]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (990) Jan 23 08:53:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (985) Jan 23 08:53:32 np0005593102 python3[59682]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (980) Jan 23 08:53:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (975) Jan 23 08:53:42 np0005593102 python3[59715]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (970) Jan 23 08:53:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (965) Jan 23 08:53:53 np0005593102 python3[59748]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (960) Jan 23 08:53:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (955) Jan 23 08:54:03 np0005593102 python3[59781]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (950) Jan 23 08:54:07 np0005593102 sshd[59784]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:54:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (945) Jan 23 08:54:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (940) Jan 23 08:54:13 np0005593102 python3[59816]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (935) Jan 23 08:54:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (930) Jan 23 08:54:24 np0005593102 python3[59849]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (925) Jan 23 08:54:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (920) Jan 23 08:54:34 np0005593102 python3[59882]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (915) Jan 23 08:54:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (910) Jan 23 08:54:44 np0005593102 python3[59912]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (905) Jan 23 08:54:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (900) Jan 23 08:54:54 np0005593102 python3[59945]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (895) Jan 23 08:55:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (890) Jan 23 08:55:05 np0005593102 python3[59978]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (885) Jan 23 08:55:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (880) Jan 23 08:55:15 np0005593102 python3[60011]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (875) Jan 23 08:55:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (870) Jan 23 08:55:25 np0005593102 python3[60033]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (865) Jan 23 08:55:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (860) Jan 23 08:55:36 np0005593102 python3[60063]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (855) Jan 23 08:55:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (850) Jan 23 08:55:46 np0005593102 python3[60096]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (845) Jan 23 08:55:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (840) Jan 23 08:55:56 np0005593102 python3[60129]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (835) Jan 23 08:56:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (830) Jan 23 08:56:06 np0005593102 python3[60162]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (825) Jan 23 08:56:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (820) Jan 23 08:56:16 np0005593102 sshd[60180]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:56:17 np0005593102 python3[60196]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (815) Jan 23 08:56:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (810) Jan 23 08:56:27 np0005593102 python3[60231]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (805) Jan 23 08:56:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (800) Jan 23 08:56:37 np0005593102 python3[60264]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (795) Jan 23 08:56:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (790) Jan 23 08:56:48 np0005593102 python3[60297]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (785) Jan 23 08:56:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (780) Jan 23 08:56:58 np0005593102 python3[60327]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (775) Jan 23 08:57:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (770) Jan 23 08:57:08 np0005593102 python3[60360]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (765) Jan 23 08:57:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (760) Jan 23 08:57:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (755) Jan 23 08:57:18 np0005593102 python3[60393]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (750) Jan 23 08:57:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (745) Jan 23 08:57:29 np0005593102 python3[60426]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (740) Jan 23 08:57:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (735) Jan 23 08:57:39 np0005593102 python3[60449]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (730) Jan 23 08:57:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (725) Jan 23 08:57:49 np0005593102 python3[60478]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (720) Jan 23 08:57:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (715) Jan 23 08:58:00 np0005593102 python3[60511]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (710) Jan 23 08:58:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (705) Jan 23 08:58:10 np0005593102 python3[60544]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (700) Jan 23 08:58:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (695) Jan 23 08:58:20 np0005593102 python3[60577]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (690) Jan 23 08:58:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (685) Jan 23 08:58:30 np0005593102 python3[60610]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (680) Jan 23 08:58:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (675) Jan 23 08:58:41 np0005593102 sshd[60628]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:58:41 np0005593102 python3[60644]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (670) Jan 23 08:58:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (665) Jan 23 08:58:51 np0005593102 python3[60679]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (660) Jan 23 08:58:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (655) Jan 23 08:59:01 np0005593102 python3[60713]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (650) Jan 23 08:59:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (645) Jan 23 08:59:12 np0005593102 python3[60743]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (640) Jan 23 08:59:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (635) Jan 23 08:59:22 np0005593102 python3[60776]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (630) Jan 23 08:59:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (625) Jan 23 08:59:32 np0005593102 python3[60809]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (620) Jan 23 08:59:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (615) Jan 23 08:59:43 np0005593102 python3[60842]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (610) Jan 23 08:59:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (605) Jan 23 08:59:53 np0005593102 python3[60865]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (600) Jan 23 08:59:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (595) Jan 23 09:00:03 np0005593102 python3[60894]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (590) Jan 23 09:00:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (585) Jan 23 09:00:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (580) Jan 23 09:00:14 np0005593102 python3[60927]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (575) Jan 23 09:00:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (570) Jan 23 09:00:24 np0005593102 python3[60961]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (565) Jan 23 09:00:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (560) Jan 23 09:00:34 np0005593102 python3[60994]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (555) Jan 23 09:00:43 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (550) Jan 23 09:00:44 np0005593102 python3[61027]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:48 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (545) Jan 23 09:00:53 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (540) Jan 23 09:00:55 np0005593102 python3[61060]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:58 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (535) Jan 23 09:01:03 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (530) Jan 23 09:01:05 np0005593102 python3[61104]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:08 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (525) Jan 23 09:01:12 np0005593102 sshd[61119]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:01:13 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (520) Jan 23 09:01:15 np0005593102 python3[61140]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:18 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (515) Jan 23 09:01:23 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (510) Jan 23 09:01:26 np0005593102 python3[61170]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:28 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (505) Jan 23 09:01:33 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (500) Jan 23 09:01:36 np0005593102 python3[61203]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:38 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (495) Jan 23 09:01:44 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (490) Jan 23 09:01:46 np0005593102 python3[61236]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:49 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (485) Jan 23 09:01:54 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (480) Jan 23 09:01:57 np0005593102 python3[61269]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:59 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (475) Jan 23 09:02:04 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (470) Jan 23 09:02:07 np0005593102 python3[61302]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:09 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (465) Jan 23 09:02:14 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (460) Jan 23 09:02:17 np0005593102 python3[61323]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:19 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (455) Jan 23 09:02:24 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (450) Jan 23 09:02:27 np0005593102 python3[61354]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:29 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (445) Jan 23 09:02:34 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (440) Jan 23 09:02:38 np0005593102 python3[61387]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:39 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (435) Jan 23 09:02:44 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (430) Jan 23 09:02:48 np0005593102 python3[61421]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:49 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (425) Jan 23 09:02:54 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (420) Jan 23 09:02:58 np0005593102 python3[61454]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:59 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (415) Jan 23 09:03:04 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (410) Jan 23 09:03:09 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (405) Jan 23 09:03:09 np0005593102 python3[61487]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:14 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (400) Jan 23 09:03:19 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (395) Jan 23 09:03:19 np0005593102 python3[61520]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:24 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (390) Jan 23 09:03:29 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (385) Jan 23 09:03:29 np0005593102 python3[61553]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:33 np0005593102 sshd[61554]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:03:34 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (380) Jan 23 09:03:39 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (375) Jan 23 09:03:40 np0005593102 python3[61585]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:44 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (370) Jan 23 09:03:49 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (365) Jan 23 09:03:50 np0005593102 python3[61618]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:54 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (360) Jan 23 09:03:54 np0005593102 sshd[61622]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:03:59 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (355) Jan 23 09:04:00 np0005593102 python3[61652]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:04 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (350) Jan 23 09:04:09 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (345) Jan 23 09:04:10 np0005593102 python3[61685]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:14 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (340) Jan 23 09:04:19 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (335) Jan 23 09:04:21 np0005593102 python3[61718]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:24 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (330) Jan 23 09:04:29 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (325) Jan 23 09:04:31 np0005593102 python3[61740]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:34 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (320) Jan 23 09:04:39 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (315) Jan 23 09:04:41 np0005593102 python3[61771]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:44 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (310) Jan 23 09:04:49 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (305) Jan 23 09:04:52 np0005593102 python3[61804]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:53 np0005593102 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:4c:0f:bd MACPROTO=0800 SRC=45.95.233.28 DST=38.102.83.246 LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=54321 PROTO=TCP SPT=53444 DPT=9090 SEQ=3201198905 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 23 09:04:54 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (300) Jan 23 09:04:58 np0005593102 sshd[61819]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:04:59 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (295) Jan 23 09:05:02 np0005593102 python3[61840]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:03 np0005593102 sshd[61841]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:04 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (290) Jan 23 09:05:08 np0005593102 sshd[61858]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:09 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (285) Jan 23 09:05:12 np0005593102 python3[61879]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:13 np0005593102 sshd[61880]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:14 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (280) Jan 23 09:05:18 np0005593102 sshd[61897]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:19 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (275) Jan 23 09:05:23 np0005593102 python3[61918]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:23 np0005593102 sshd[61919]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:24 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (270) Jan 23 09:05:29 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (265) Jan 23 09:05:29 np0005593102 sshd[61936]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:33 np0005593102 python3[61957]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:34 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (260) Jan 23 09:05:34 np0005593102 sshd[61958]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:39 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (255) Jan 23 09:05:39 np0005593102 sshd[61975]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:43 np0005593102 sshd[61978]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:43 np0005593102 python3[61998]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:44 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (250) Jan 23 09:05:48 np0005593102 sshd[62000]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:49 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (245) Jan 23 09:05:53 np0005593102 sshd[62017]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:53 np0005593102 python3[62034]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:54 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (240) Jan 23 09:05:58 np0005593102 sshd[62039]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:59 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (235) Jan 23 09:06:01 np0005593102 sshd[62056]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:03 np0005593102 sshd[62059]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:04 np0005593102 python3[62075]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:04 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (230) Jan 23 09:06:07 np0005593102 sshd[62080]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:09 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (225) Jan 23 09:06:12 np0005593102 sshd[62097]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:14 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (220) Jan 23 09:06:14 np0005593102 python3[62115]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:17 np0005593102 sshd[62119]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:19 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (215) Jan 23 09:06:22 np0005593102 sshd[62126]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:24 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (210) Jan 23 09:06:24 np0005593102 python3[62154]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:28 np0005593102 sshd[62158]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:29 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (205) Jan 23 09:06:33 np0005593102 sshd[62161]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:34 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (200) Jan 23 09:06:35 np0005593102 python3[62193]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:36 np0005593102 sshd[62194]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:39 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (195) Jan 23 09:06:41 np0005593102 sshd[62200]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:44 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (190) Jan 23 09:06:45 np0005593102 python3[62222]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:47 np0005593102 sshd[62233]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:49 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (185) Jan 23 09:06:52 np0005593102 sshd[62239]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:54 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (180) Jan 23 09:06:55 np0005593102 python3[62257]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:57 np0005593102 sshd[62272]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:06:59 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (175) Jan 23 09:07:02 np0005593102 sshd[62278]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:04 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (170) Jan 23 09:07:05 np0005593102 python3[62296]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:07 np0005593102 sshd[62301]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:09 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (165) Jan 23 09:07:11 np0005593102 sshd[62314]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:14 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (160) Jan 23 09:07:14 np0005593102 sshd[62321]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:16 np0005593102 python3[62339]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:19 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (155) Jan 23 09:07:19 np0005593102 sshd[62354]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:23 np0005593102 sshd[62357]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:24 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (150) Jan 23 09:07:26 np0005593102 python3[62378]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:26 np0005593102 sshd[62379]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:29 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (145) Jan 23 09:07:31 np0005593102 sshd[62396]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:34 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (140) Jan 23 09:07:35 np0005593102 sshd[62399]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:36 np0005593102 python3[62420]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:38 np0005593102 sshd[62421]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:39 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (135) Jan 23 09:07:43 np0005593102 sshd[62438]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:44 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (130) Jan 23 09:07:46 np0005593102 sshd[62460]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:46 np0005593102 python3[62459]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:49 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (125) Jan 23 09:07:52 np0005593102 sshd[62466]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:54 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (120) Jan 23 09:07:57 np0005593102 sshd[62496]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:07:57 np0005593102 python3[62495]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:59 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (115) Jan 23 09:08:00 np0005593102 sshd[62502]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:04 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (110) Jan 23 09:08:05 np0005593102 sshd[62519]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:05 np0005593102 sshd[62521]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:07 np0005593102 python3[62540]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:09 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (105) Jan 23 09:08:11 np0005593102 sshd[62546]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:14 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (100) Jan 23 09:08:16 np0005593102 sshd[62563]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:17 np0005593102 python3[62581]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:19 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (95) Jan 23 09:08:21 np0005593102 sshd[62585]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:24 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (90) Jan 23 09:08:26 np0005593102 sshd[62602]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:28 np0005593102 python3[62620]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:29 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (85) Jan 23 09:08:31 np0005593102 sshd[62624]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:32 np0005593102 sshd[62626]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:34 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (80) Jan 23 09:08:36 np0005593102 sshd[62634]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:38 np0005593102 python3[62662]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:39 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (75) Jan 23 09:08:41 np0005593102 sshd[62663]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:44 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (70) Jan 23 09:08:47 np0005593102 sshd[62669]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:48 np0005593102 python3[62701]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:49 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (65) Jan 23 09:08:52 np0005593102 sshd[62702]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:54 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (60) Jan 23 09:08:57 np0005593102 sshd[62708]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:08:58 np0005593102 python3[62728]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:59 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (55) Jan 23 09:09:02 np0005593102 sshd[62741]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:04 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (50) Jan 23 09:09:05 np0005593102 sshd[62747]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:09 np0005593102 python3[62765]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:09 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (45) Jan 23 09:09:11 np0005593102 sshd[62780]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:14 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (40) Jan 23 09:09:16 np0005593102 sshd[62783]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:19 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (35) Jan 23 09:09:19 np0005593102 python3[62804]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:21 np0005593102 sshd[62809]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:24 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (30) Jan 23 09:09:26 np0005593102 sshd[62822]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:29 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (25) Jan 23 09:09:29 np0005593102 python3[62843]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:31 np0005593102 sshd[62844]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:34 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (20) Jan 23 09:09:35 np0005593102 sshd[62861]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:39 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (15) Jan 23 09:09:40 np0005593102 python3[62882]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:40 np0005593102 sshd[62883]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:44 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (10) Jan 23 09:09:45 np0005593102 sshd[62900]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:49 np0005593102 ansible-async_wrapper.py[48527]: 48528 still running (5) Jan 23 09:09:50 np0005593102 python3[62921]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:50 np0005593102 sshd[62922]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:54 np0005593102 ansible-async_wrapper.py[48527]: Timeout reached, now killing 48528 Jan 23 09:09:54 np0005593102 ansible-async_wrapper.py[48527]: Sent kill to group 48528 Jan 23 09:09:55 np0005593102 sshd[62940]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:09:59 np0005593102 sshd[62943]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:00 np0005593102 python3[62961]: ansible-ansible.legacy.async_status Invoked with jid=806462428331.48524 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:10:01 np0005593102 python3[62977]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 09:10:01 np0005593102 python3[62993]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:10:02 np0005593102 python3[63041]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:02 np0005593102 python3[63084]: ansible-ansible.legacy.copy Invoked with dest=/var/lib/container-puppet/puppetlabs/facter.conf setype=svirt_sandbox_file_t selevel=s0 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159401.9026132-172572-163131440215611/source _original_basename=tmpjsjyou1z follow=False checksum=53908622cb869db5e2e2a68e737aa2ab1a872111 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 09:10:03 np0005593102 python3[63114]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:04 np0005593102 sshd[63219]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:04 np0005593102 python3[63218]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Jan 23 09:10:04 np0005593102 python3[63239]: ansible-file Invoked with path=/var/lib/tripleo-config/container-puppet-config mode=448 recurse=True setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False state=None _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 09:10:05 np0005593102 python3[63255]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=False puppet_config=/var/lib/container-puppet/container-puppet.json short_hostname=np0005593102 step=1 update_config_hash_only=False Jan 23 09:10:05 np0005593102 python3[63272]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:06 np0005593102 python3[63288]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Jan 23 09:10:06 np0005593102 systemd-journald[617]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 75.4 (251 of 333 items), suggesting rotation. Jan 23 09:10:06 np0005593102 systemd-journald[617]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 09:10:06 np0005593102 rsyslogd[48333]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 09:10:06 np0005593102 rsyslogd[48333]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 09:10:06 np0005593102 python3[63305]: ansible-containers.podman.podman_container_info Invoked with executable=podman name=None Jan 23 09:10:06 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:07 np0005593102 python3[63332]: ansible-tripleo_container_manage Invoked with config_id=tripleo_puppet_step1 config_dir=/var/lib/tripleo-config/container-puppet-config/step_1 config_patterns=container-puppet-*.json config_overrides={} concurrency=6 log_base_path=/var/log/containers/stdouts debug=False Jan 23 09:10:07 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:07 np0005593102 podman[63534]: 2026-01-23 09:10:07.884946259 +0000 UTC m=+0.072674655 container create 1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., url=https://www.redhat.com, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, build-date=2025-11-19T00:11:59Z, tcib_managed=true, io.openshift.expose-services=, container_name=container-puppet-ceilometer, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, release=1761123044, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20251118.1, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, io.buildah.version=1.41.4, name=rhosp17/openstack-ceilometer-central, com.redhat.component=openstack-ceilometer-central-container) Jan 23 09:10:07 np0005593102 podman[63549]: 2026-01-23 09:10:07.906395502 +0000 UTC m=+0.083480383 container create d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, release=1761123044, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-collectd, name=rhosp17/openstack-collectd, summary=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.4, managed_by=tripleo_ansible, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, build-date=2025-11-18T22:51:28Z, vcs-type=git, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-collectd-container, description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, distribution-scope=public, io.openshift.expose-services=, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:07 np0005593102 podman[63532]: 2026-01-23 09:10:07.921785461 +0000 UTC m=+0.111196719 container create 933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, vendor=Red Hat, Inc., io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-clustercheck, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, url=https://www.redhat.com, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:07 np0005593102 systemd[1]: Created slice Slice /machine. Jan 23 09:10:07 np0005593102 systemd[1]: Started libpod-conmon-1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536.scope. Jan 23 09:10:07 np0005593102 podman[63534]: 2026-01-23 09:10:07.839221346 +0000 UTC m=+0.026949752 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Jan 23 09:10:07 np0005593102 systemd[1]: Started libpod-conmon-d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c.scope. Jan 23 09:10:07 np0005593102 systemd[1]: Started libpod-conmon-933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82.scope. Jan 23 09:10:07 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:07 np0005593102 podman[63561]: 2026-01-23 09:10:07.952112404 +0000 UTC m=+0.117177690 container create 5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, batch=17.1_20251118.1, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-glance-api, build-date=2025-11-18T23:45:01Z, io.openshift.expose-services=, release=1761123044, version=17.1.12, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., distribution-scope=public, container_name=container-puppet-glance_api_internal, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, tcib_managed=true, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-glance-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 glance-api) Jan 23 09:10:07 np0005593102 podman[63549]: 2026-01-23 09:10:07.855399308 +0000 UTC m=+0.032484219 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Jan 23 09:10:07 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:07 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:07 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/2c6a3a746a0f043ea0e30e1b408d980c412c672622279e827abd6ba867a54a89/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:07 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/545cae3549b27cd709724ec7446c4ffee42a4c5fefc42c2ff8f9e8e68f5c75a4/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:07 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/81364c7fa604217828567dceeba7408f6b31880b19293d834190b9ffcb6a60c8/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:07 np0005593102 podman[63553]: 2026-01-23 09:10:07.96412417 +0000 UTC m=+0.135273181 container create c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-19T00:20:06Z, container_name=container-puppet-cinder, config_id=tripleo_puppet_step1, vcs-type=git, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, batch=17.1_20251118.1, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, version=17.1.12, tcib_managed=true, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, name=rhosp17/openstack-cinder-api, architecture=x86_64) Jan 23 09:10:07 np0005593102 podman[63532]: 2026-01-23 09:10:07.874059087 +0000 UTC m=+0.063470355 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:07 np0005593102 podman[63549]: 2026-01-23 09:10:07.97921333 +0000 UTC m=+0.156298201 container init d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, version=17.1.12, build-date=2025-11-18T22:51:28Z, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, com.redhat.component=openstack-collectd-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, name=rhosp17/openstack-collectd, container_name=container-puppet-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, io.buildah.version=1.41.4, url=https://www.redhat.com) Jan 23 09:10:07 np0005593102 podman[63553]: 2026-01-23 09:10:07.879093781 +0000 UTC m=+0.050242792 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Jan 23 09:10:07 np0005593102 podman[63550]: 2026-01-23 09:10:07.880633557 +0000 UTC m=+0.050080956 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 09:10:07 np0005593102 podman[63561]: 2026-01-23 09:10:07.882737861 +0000 UTC m=+0.047803187 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 09:10:07 np0005593102 podman[63534]: 2026-01-23 09:10:07.984341645 +0000 UTC m=+0.172070031 container init 1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, build-date=2025-11-19T00:11:59Z, release=1761123044, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, tcib_managed=true, url=https://www.redhat.com, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.buildah.version=1.41.4, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, version=17.1.12, container_name=container-puppet-ceilometer, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-ceilometer-central, com.redhat.component=openstack-ceilometer-central-container, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central) Jan 23 09:10:07 np0005593102 podman[63549]: 2026-01-23 09:10:07.987034648 +0000 UTC m=+0.164119529 container start d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, build-date=2025-11-18T22:51:28Z, vcs-type=git, batch=17.1_20251118.1, name=rhosp17/openstack-collectd, io.openshift.expose-services=, container_name=container-puppet-collectd, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, maintainer=OpenStack TripleO Team, version=17.1.12, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, config_id=tripleo_puppet_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 collectd, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:07 np0005593102 podman[63549]: 2026-01-23 09:10:07.987172472 +0000 UTC m=+0.164257353 container attach d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.4, com.redhat.component=openstack-collectd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, release=1761123044, description=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, distribution-scope=public, build-date=2025-11-18T22:51:28Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, name=rhosp17/openstack-collectd, version=17.1.12, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, container_name=container-puppet-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:07 np0005593102 podman[63550]: 2026-01-23 09:10:07.989037699 +0000 UTC m=+0.158485078 container create e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, name=rhosp17/openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, architecture=x86_64, com.redhat.component=openstack-glance-api-container, version=17.1.12, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T23:45:01Z, batch=17.1_20251118.1, io.openshift.expose-services=, container_name=container-puppet-glance_api, release=1761123044, description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, url=https://www.redhat.com, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4) Jan 23 09:10:07 np0005593102 podman[63534]: 2026-01-23 09:10:07.992996919 +0000 UTC m=+0.180725305 container start 1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, name=rhosp17/openstack-ceilometer-central, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-ceilometer, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, vendor=Red Hat, Inc., version=17.1.12, description=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, release=1761123044, build-date=2025-11-19T00:11:59Z, io.buildah.version=1.41.4, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, distribution-scope=public, tcib_managed=true, com.redhat.component=openstack-ceilometer-central-container, batch=17.1_20251118.1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:07 np0005593102 podman[63534]: 2026-01-23 09:10:07.993787254 +0000 UTC m=+0.181515670 container attach 1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, vcs-type=git, io.openshift.expose-services=, distribution-scope=public, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, description=Red Hat OpenStack Platform 17.1 ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, name=rhosp17/openstack-ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-ceilometer, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., com.redhat.component=openstack-ceilometer-central-container, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20251118.1, build-date=2025-11-19T00:11:59Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:07 np0005593102 systemd[1]: Started libpod-conmon-5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce.scope. Jan 23 09:10:08 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:08 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/cb727e674813e98b08c33959adc3d3a6ef13ef6207c962e5dc3366404c28f66c/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:08 np0005593102 podman[63561]: 2026-01-23 09:10:08.018907559 +0000 UTC m=+0.183972845 container init 5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, architecture=x86_64, distribution-scope=public, container_name=container-puppet-glance_api_internal, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T23:45:01Z, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.component=openstack-glance-api-container, io.buildah.version=1.41.4, name=rhosp17/openstack-glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=) Jan 23 09:10:08 np0005593102 podman[63561]: 2026-01-23 09:10:08.024476829 +0000 UTC m=+0.189542105 container start 5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, io.openshift.expose-services=, version=17.1.12, name=rhosp17/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_puppet_step1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.buildah.version=1.41.4, release=1761123044, url=https://www.redhat.com, build-date=2025-11-18T23:45:01Z, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-glance_api_internal, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-glance-api-container, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, distribution-scope=public) Jan 23 09:10:08 np0005593102 podman[63561]: 2026-01-23 09:10:08.024695965 +0000 UTC m=+0.189761261 container attach 5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, distribution-scope=public, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 glance-api, release=1761123044, version=17.1.12, container_name=container-puppet-glance_api_internal, com.redhat.component=openstack-glance-api-container, io.openshift.expose-services=, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-glance-api, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, managed_by=tripleo_ansible, build-date=2025-11-18T23:45:01Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:08 np0005593102 podman[63532]: 2026-01-23 09:10:08.031002897 +0000 UTC m=+0.220414135 container init 933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, vendor=Red Hat, Inc., architecture=x86_64, config_id=tripleo_puppet_step1, io.openshift.expose-services=, version=17.1.12, com.redhat.component=openstack-mariadb-container, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, io.buildah.version=1.41.4, url=https://www.redhat.com, build-date=2025-11-18T22:51:13Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, batch=17.1_20251118.1, distribution-scope=public, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, container_name=container-puppet-clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb) Jan 23 09:10:08 np0005593102 podman[63532]: 2026-01-23 09:10:08.037108913 +0000 UTC m=+0.226520161 container start 933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, distribution-scope=public, name=rhosp17/openstack-mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, url=https://www.redhat.com, com.redhat.component=openstack-mariadb-container, release=1761123044, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.openshift.expose-services=, config_id=tripleo_puppet_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, version=17.1.12, vcs-type=git, batch=17.1_20251118.1, container_name=container-puppet-clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2025-11-18T22:51:13Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:08 np0005593102 podman[63532]: 2026-01-23 09:10:08.037264037 +0000 UTC m=+0.226675305 container attach 933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1761123044, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, version=17.1.12, com.redhat.component=openstack-mariadb-container, tcib_managed=true, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, container_name=container-puppet-clustercheck, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:51:13Z) Jan 23 09:10:08 np0005593102 systemd[1]: Started libpod-conmon-e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d.scope. Jan 23 09:10:08 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:08 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b74117a1b41b576a6dfa831830f77a19393407f56c70800f65e817e992af2160/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:08 np0005593102 podman[63550]: 2026-01-23 09:10:08.087456806 +0000 UTC m=+0.256904195 container init e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp17/openstack-glance-api, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.buildah.version=1.41.4, distribution-scope=public, version=17.1.12, com.redhat.component=openstack-glance-api-container, release=1761123044, build-date=2025-11-18T23:45:01Z, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-glance_api, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1) Jan 23 09:10:08 np0005593102 podman[63550]: 2026-01-23 09:10:08.093877762 +0000 UTC m=+0.263325141 container start e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, config_id=tripleo_puppet_step1, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-glance-api-container, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vendor=Red Hat, Inc., org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, release=1761123044, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-glance-api, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, container_name=container-puppet-glance_api, maintainer=OpenStack TripleO Team, build-date=2025-11-18T23:45:01Z, batch=17.1_20251118.1, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=) Jan 23 09:10:08 np0005593102 podman[63550]: 2026-01-23 09:10:08.094075369 +0000 UTC m=+0.263522768 container attach e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, build-date=2025-11-18T23:45:01Z, version=17.1.12, com.redhat.component=openstack-glance-api-container, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, distribution-scope=public, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, vcs-type=git, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-glance_api) Jan 23 09:10:08 np0005593102 systemd[1]: Started libpod-conmon-c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426.scope. Jan 23 09:10:08 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:08 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/14b43d9ecc630ef9f2ed0dc988569746fd8cd010482387ef729f33a7f12ac273/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:08 np0005593102 podman[63553]: 2026-01-23 09:10:08.11939523 +0000 UTC m=+0.290544221 container init c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, release=1761123044, url=https://www.redhat.com, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, name=rhosp17/openstack-cinder-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, vcs-type=git, vendor=Red Hat, Inc., version=17.1.12, summary=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, build-date=2025-11-19T00:20:06Z, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.4, com.redhat.component=openstack-cinder-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-cinder, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:08 np0005593102 podman[63553]: 2026-01-23 09:10:08.127293179 +0000 UTC m=+0.298442190 container start c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, distribution-scope=public, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, io.openshift.expose-services=, vendor=Red Hat, Inc., release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, description=Red Hat OpenStack Platform 17.1 cinder-api, container_name=container-puppet-cinder, version=17.1.12, name=rhosp17/openstack-cinder-api, com.redhat.component=openstack-cinder-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, tcib_managed=true, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, url=https://www.redhat.com, build-date=2025-11-19T00:20:06Z, managed_by=tripleo_ansible) Jan 23 09:10:08 np0005593102 podman[63553]: 2026-01-23 09:10:08.127504756 +0000 UTC m=+0.298653757 container attach c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, description=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, vcs-type=git, io.buildah.version=1.41.4, build-date=2025-11-19T00:20:06Z, url=https://www.redhat.com, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, container_name=container-puppet-cinder, com.redhat.component=openstack-cinder-api-container, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, architecture=x86_64, config_id=tripleo_puppet_step1, tcib_managed=true, batch=17.1_20251118.1) Jan 23 09:10:09 np0005593102 sshd[63761]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:09 np0005593102 puppet-user[63661]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:09 np0005593102 puppet-user[63661]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:09 np0005593102 puppet-user[63661]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:09 np0005593102 puppet-user[63661]: (file & line not available) Jan 23 09:10:09 np0005593102 puppet-user[63661]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:09 np0005593102 puppet-user[63661]: (file & line not available) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:09 np0005593102 puppet-user[63662]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:09 np0005593102 puppet-user[63662]: (file & line not available) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:09 np0005593102 puppet-user[63662]: (file & line not available) Jan 23 09:10:09 np0005593102 puppet-user[63683]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:09 np0005593102 puppet-user[63683]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:09 np0005593102 puppet-user[63683]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:09 np0005593102 puppet-user[63683]: (file & line not available) Jan 23 09:10:09 np0005593102 puppet-user[63683]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:09 np0005593102 puppet-user[63683]: (file & line not available) Jan 23 09:10:09 np0005593102 puppet-user[63712]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:09 np0005593102 puppet-user[63712]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:09 np0005593102 puppet-user[63712]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:09 np0005593102 puppet-user[63712]: (file & line not available) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::cache_backend'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 145, column: 39) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::memcache_servers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 146, column: 39) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::cache_tls_enabled'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 147, column: 39) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::cache_tls_cafile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 148, column: 39) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::cache_tls_certfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 149, column: 39) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::cache_tls_keyfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 150, column: 39) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::cache_tls_allowed_ciphers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 151, column: 39) Jan 23 09:10:09 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::manage_backend_package'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 152, column: 39) Jan 23 09:10:09 np0005593102 puppet-user[63712]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:09 np0005593102 puppet-user[63712]: (file & line not available) Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:10 np0005593102 puppet-user[63725]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:10 np0005593102 puppet-user[63725]: (file & line not available) Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:10 np0005593102 puppet-user[63725]: (file & line not available) Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: Scope(Class[Tripleo::Profile::Base::Cinder::Api]): The keymgr_backend parameter has been deprecated and has no effect. Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_password'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 63, column: 25) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_url'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 68, column: 25) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_region'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 69, column: 28) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 70, column: 25) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_tenant_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 71, column: 29) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_cacert'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 72, column: 23) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_endpoint_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 73, column: 26) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 74, column: 33) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_project_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 75, column: 36) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 76, column: 26) Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.38 seconds Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: Scope(Class[Cinder]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:10 np0005593102 puppet-user[63725]: removed in a future realse. Use cinder::db::database_connection instead Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: Unknown variable: 'cinder::api::keymgr_backend'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 455, column: 31) Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_api_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 456, column: 42) Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_auth_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 458, column: 43) Jan 23 09:10:10 np0005593102 puppet-user[63690]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:10 np0005593102 puppet-user[63690]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:10 np0005593102 puppet-user[63690]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:10 np0005593102 puppet-user[63690]: (file & line not available) Jan 23 09:10:10 np0005593102 puppet-user[63690]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:10 np0005593102 puppet-user[63690]: (file & line not available) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.42 seconds Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/content: content changed '{sha256}aea388a73ebafc7e07a81ddb930a91099211f660eee55fbf92c13007a77501e5' to '{sha256}2523d01ee9c3022c0e9f61d896b1474a168e18472aee141cc278e69fe13f41c1' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/owner: owner changed 'collectd' to 'root' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/group: group changed 'collectd' to 'root' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/mode: mode changed '0644' to '0640' Jan 23 09:10:10 np0005593102 puppet-user[63690]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.08 seconds Jan 23 09:10:10 np0005593102 puppet-user[63690]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}e8b37ea66bca5d13d264b7846744289a56723e3dcc6c5fc2d9dccb681998ddf7' Jan 23 09:10:10 np0005593102 puppet-user[63690]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.d]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63690]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.conf]/ensure: defined content as '{sha256}37f48d3e5dce056a46519d144042a388bde95ea9fa161d3362eedf70e7987a91' Jan 23 09:10:10 np0005593102 puppet-user[63690]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/Xinetd::Service[galera-monitor]/File[/etc/xinetd.d/galera-monitor]/ensure: defined content as '{sha256}d8dda3bf21499091549cbc07993e45661619cb636a341c2650a15fc008cfe8a7' Jan 23 09:10:10 np0005593102 puppet-user[63690]: Notice: Applied catalog in 0.03 seconds Jan 23 09:10:10 np0005593102 puppet-user[63690]: Application: Jan 23 09:10:10 np0005593102 puppet-user[63690]: Initial environment: production Jan 23 09:10:10 np0005593102 puppet-user[63690]: Converged environment: production Jan 23 09:10:10 np0005593102 puppet-user[63690]: Run mode: user Jan 23 09:10:10 np0005593102 puppet-user[63690]: Changes: Jan 23 09:10:10 np0005593102 puppet-user[63690]: Total: 4 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Events: Jan 23 09:10:10 np0005593102 puppet-user[63690]: Success: 4 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Total: 4 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Resources: Jan 23 09:10:10 np0005593102 puppet-user[63690]: Changed: 4 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Out of sync: 4 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Skipped: 9 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Total: 13 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Time: Jan 23 09:10:10 np0005593102 puppet-user[63690]: File: 0.01 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Transaction evaluation: 0.02 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Catalog application: 0.03 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Config retrieval: 0.11 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Last run: 1769159410 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Total: 0.03 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Version: Jan 23 09:10:10 np0005593102 puppet-user[63690]: Config: 1769159410 Jan 23 09:10:10 np0005593102 puppet-user[63690]: Puppet: 7.10.0 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/http_timeout]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/host]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[publisher/telemetry_secret]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_name]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_password]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/owner: owner changed 'collectd' to 'root' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/group: group changed 'collectd' to 'root' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/mode: mode changed '0755' to '0750' Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_url]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-cpu.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-interface.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-load.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-memory.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-syslog.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/apache.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/region_name]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/dns.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ipmi.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mcelog.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mysql.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-events.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-stats.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/username]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ping.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/pmu.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/rdt.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/sensors.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/snmp.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/virt.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/write_prometheus.conf]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/password]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Python/File[/usr/lib/python3.9/site-packages]/mode: mode changed '0755' to '0750' Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_name]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/interface]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/user_domain_name]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Python/Collectd::Plugin[python]/File[python.load]/ensure: defined content as '{sha256}0163924a0099dd43fe39cb85e836df147fd2cfee8197dc6866d3c384539eb6ee' Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_domain_name]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_type]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Python/Concat[/etc/collectd.d/python-config.conf]/File[/etc/collectd.d/python-config.conf]/ensure: defined content as '{sha256}2e5fb20e60b30f84687fc456a37fc62451000d2d85f5bbc1b3fca3a5eac9deeb' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Logfile/Collectd::Plugin[logfile]/File[logfile.load]/ensure: defined content as '{sha256}07bbda08ef9b824089500bdc6ac5a86e7d1ef2ae3ed4ed423c0559fe6361e5af' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Amqp1/Collectd::Plugin[amqp1]/File[amqp1.load]/ensure: defined content as '{sha256}0772ea79ea74f54aef0a0eafbfece2741e211a8497f02ef97ed929d570027645' Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[DEFAULT/polling_namespaces]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[polling/tenant_name_discovery]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Cpu/Collectd::Plugin[cpu]/File[cpu.load]/ensure: defined content as '{sha256}67d4c8bf6bf5785f4cb6b596712204d9eacbcebbf16fe289907195d4d3cb0e34' Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[coordination/backend_url]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Df/Collectd::Plugin[df]/File[df.load]/ensure: defined content as '{sha256}edeb4716d96fc9dca2c6adfe07bae70ba08c6af3944a3900581cba0f08f3c4ba' Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Agent::Notification/File[event_pipeline]/ensure: defined content as '{sha256}97b000582d6be7fd4e80bc1fc15bc0358888fdea71d4447491d8c683cd09e21b' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Disk/Collectd::Plugin[disk]/File[disk.load]/ensure: defined content as '{sha256}1d0cb838278f3226fcd381f0fc2e0e1abaf0d590f4ba7bcb2fc6ec113d3ebde7' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[hugepages.load]/ensure: defined content as '{sha256}9b9f35b65a73da8d4037e4355a23b678f2cf61997ccf7a5e1adf2a7ce6415827' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[older_hugepages.load]/ensure: removed Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Interface/Collectd::Plugin[interface]/File[interface.load]/ensure: defined content as '{sha256}b76b315dc312e398940fe029c6dbc5c18d2b974ff7527469fc7d3617b5222046' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Load/Collectd::Plugin[load]/File[load.load]/ensure: defined content as '{sha256}af2403f76aebd2f10202d66d2d55e1a8d987eed09ced5a3e3873a4093585dc31' Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/backend]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Memory/Collectd::Plugin[memory]/File[memory.load]/ensure: defined content as '{sha256}0f270425ee6b05fc9440ee32b9afd1010dcbddd9b04ca78ff693858f7ecb9d0e' Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/enabled]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Unixsock/Collectd::Plugin[unixsock]/File[unixsock.load]/ensure: defined content as '{sha256}9d1ec1c51ba386baa6f62d2e019dbd6998ad924bf868b3edc2d24d3dc3c63885' Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/memcache_servers]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Uptime/Collectd::Plugin[uptime]/File[uptime.load]/ensure: defined content as '{sha256}f7a26c6369f904d0ca1af59627ebea15f5e72160bcacdf08d217af282b42e5c0' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: /Stage[main]/Collectd::Plugin::Memcached/Collectd::Plugin[memcached]/File[memcached.load]/ensure: defined content as '{sha256}9f94ce3e1a504156a8653946a742d9948e2a295d4a5bf0556b2253082804524e' Jan 23 09:10:10 np0005593102 puppet-user[63661]: Notice: Applied catalog in 0.22 seconds Jan 23 09:10:10 np0005593102 puppet-user[63661]: Application: Jan 23 09:10:10 np0005593102 puppet-user[63661]: Initial environment: production Jan 23 09:10:10 np0005593102 puppet-user[63661]: Converged environment: production Jan 23 09:10:10 np0005593102 puppet-user[63661]: Run mode: user Jan 23 09:10:10 np0005593102 puppet-user[63661]: Changes: Jan 23 09:10:10 np0005593102 puppet-user[63661]: Total: 42 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Events: Jan 23 09:10:10 np0005593102 puppet-user[63661]: Success: 42 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Total: 42 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Resources: Jan 23 09:10:10 np0005593102 puppet-user[63661]: Skipped: 12 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Changed: 37 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Out of sync: 37 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Total: 77 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Time: Jan 23 09:10:10 np0005593102 puppet-user[63661]: Concat fragment: 0.00 Jan 23 09:10:10 np0005593102 puppet-user[63661]: File: 0.07 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Transaction evaluation: 0.22 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Catalog application: 0.22 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Config retrieval: 0.46 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Last run: 1769159410 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Concat file: 0.00 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Total: 0.23 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Version: Jan 23 09:10:10 np0005593102 puppet-user[63661]: Config: 1769159409 Jan 23 09:10:10 np0005593102 puppet-user[63661]: Puppet: 7.10.0 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/tls_enabled]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Rabbit[ceilometer_config]/Ceilometer_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/rpc_address_prefix]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/notify_address_prefix]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63683]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Jan 23 09:10:10 np0005593102 puppet-user[63683]: glance::backend::multistore::cinder::cinder_os_region_name instead. Jan 23 09:10:10 np0005593102 puppet-user[63683]: Warning: Scope(Class[Glance::Api]): The show_multiple_locations parameter is deprecated, and will be removed in a future release Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/topics]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Default[ceilometer_config]/Ceilometer_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/debug]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:10 np0005593102 puppet-user[63712]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Jan 23 09:10:10 np0005593102 puppet-user[63712]: glance::backend::multistore::cinder::cinder_os_region_name instead. Jan 23 09:10:10 np0005593102 systemd[1]: libpod-933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82.scope: Deactivated successfully. Jan 23 09:10:10 np0005593102 systemd[1]: libpod-933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82.scope: Consumed 2.541s CPU time. Jan 23 09:10:10 np0005593102 puppet-user[63662]: Notice: Applied catalog in 0.37 seconds Jan 23 09:10:10 np0005593102 podman[63532]: 2026-01-23 09:10:10.677846032 +0000 UTC m=+2.867257280 container died 933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, url=https://www.redhat.com, distribution-scope=public, release=1761123044, vendor=Red Hat, Inc., batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, io.buildah.version=1.41.4, io.openshift.expose-services=, vcs-type=git, architecture=x86_64, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, container_name=container-puppet-clustercheck, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:51:13Z, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb) Jan 23 09:10:10 np0005593102 puppet-user[63662]: Application: Jan 23 09:10:10 np0005593102 puppet-user[63662]: Initial environment: production Jan 23 09:10:10 np0005593102 puppet-user[63662]: Converged environment: production Jan 23 09:10:10 np0005593102 puppet-user[63662]: Run mode: user Jan 23 09:10:10 np0005593102 puppet-user[63662]: Changes: Jan 23 09:10:10 np0005593102 puppet-user[63662]: Total: 31 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Events: Jan 23 09:10:10 np0005593102 puppet-user[63662]: Success: 31 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Total: 31 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Resources: Jan 23 09:10:10 np0005593102 puppet-user[63662]: Skipped: 24 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Changed: 31 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Out of sync: 31 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Total: 157 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Time: Jan 23 09:10:10 np0005593102 puppet-user[63662]: File: 0.01 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Ceilometer config: 0.30 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Transaction evaluation: 0.36 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Catalog application: 0.37 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Config retrieval: 0.49 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Last run: 1769159410 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Resources: 0.00 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Total: 0.37 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Version: Jan 23 09:10:10 np0005593102 puppet-user[63662]: Config: 1769159409 Jan 23 09:10:10 np0005593102 puppet-user[63662]: Puppet: 7.10.0 Jan 23 09:10:10 np0005593102 systemd[1]: tmp-crun.mRmKsE.mount: Deactivated successfully. Jan 23 09:10:10 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:10 np0005593102 systemd[1]: var-lib-containers-storage-overlay-81364c7fa604217828567dceeba7408f6b31880b19293d834190b9ffcb6a60c8-merged.mount: Deactivated successfully. Jan 23 09:10:10 np0005593102 podman[64181]: 2026-01-23 09:10:10.812800152 +0000 UTC m=+0.125617367 container cleanup 933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, container_name=container-puppet-clustercheck, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-type=git, architecture=x86_64, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, release=1761123044, batch=17.1_20251118.1, name=rhosp17/openstack-mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:51:13Z, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, version=17.1.12, vendor=Red Hat, Inc.) Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/backup.pp, line: 94, column: 18) Jan 23 09:10:10 np0005593102 systemd[1]: libpod-conmon-933d22f06b8d16aa1d712bb185c7337524c3ef2cdd7de0b9557273188beacc82.scope: Deactivated successfully. Jan 23 09:10:10 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-clustercheck --conmon-pidfile /run/container-puppet-clustercheck.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=clustercheck --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::pacemaker::clustercheck --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-clustercheck --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-clustercheck.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:10 np0005593102 systemd[1]: libpod-d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c.scope: Deactivated successfully. Jan 23 09:10:10 np0005593102 systemd[1]: libpod-d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c.scope: Consumed 2.660s CPU time. Jan 23 09:10:10 np0005593102 podman[63549]: 2026-01-23 09:10:10.867357034 +0000 UTC m=+3.044441915 container died d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, distribution-scope=public, container_name=container-puppet-collectd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, maintainer=OpenStack TripleO Team, release=1761123044, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, name=rhosp17/openstack-collectd, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 collectd, build-date=2025-11-18T22:51:28Z, description=Red Hat OpenStack Platform 17.1 collectd, managed_by=tripleo_ansible, io.openshift.expose-services=, version=17.1.12, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd) Jan 23 09:10:10 np0005593102 puppet-user[63725]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/volume.pp, line: 69, column: 18) Jan 23 09:10:10 np0005593102 podman[64235]: 2026-01-23 09:10:10.946544096 +0000 UTC m=+0.073092267 container cleanup d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, summary=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-collectd, io.buildah.version=1.41.4, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-collectd-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:51:28Z, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, container_name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, vendor=Red Hat, Inc., version=17.1.12) Jan 23 09:10:10 np0005593102 systemd[1]: libpod-conmon-d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c.scope: Deactivated successfully. Jan 23 09:10:10 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-collectd --conmon-pidfile /run/container-puppet-collectd.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,collectd_client_config,exec --env NAME=collectd --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::collectd --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-collectd --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-collectd.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Jan 23 09:10:11 np0005593102 systemd[1]: libpod-1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536.scope: Deactivated successfully. Jan 23 09:10:11 np0005593102 systemd[1]: libpod-1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536.scope: Consumed 2.946s CPU time. Jan 23 09:10:11 np0005593102 podman[63534]: 2026-01-23 09:10:11.095369698 +0000 UTC m=+3.283098104 container died 1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, container_name=container-puppet-ceilometer, release=1761123044, name=rhosp17/openstack-ceilometer-central, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, io.openshift.expose-services=, distribution-scope=public, vendor=Red Hat, Inc., org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, version=17.1.12, description=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.component=openstack-ceilometer-central-container, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, build-date=2025-11-19T00:11:59Z, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-type=git) Jan 23 09:10:11 np0005593102 puppet-user[63683]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Jan 23 09:10:11 np0005593102 podman[64339]: 2026-01-23 09:10:11.167727932 +0000 UTC m=+0.063029701 container cleanup 1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, architecture=x86_64, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, url=https://www.redhat.com, com.redhat.component=openstack-ceilometer-central-container, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-ceilometer-central, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, release=1761123044, build-date=2025-11-19T00:11:59Z, container_name=container-puppet-ceilometer, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, distribution-scope=public) Jan 23 09:10:11 np0005593102 systemd[1]: libpod-conmon-1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536.scope: Deactivated successfully. Jan 23 09:10:11 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ceilometer --conmon-pidfile /run/container-puppet-ceilometer.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config --env NAME=ceilometer --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::ceilometer::agent::polling#012#012include tripleo::profile::base::ceilometer::agent::notification#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ceilometer --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ceilometer.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Jan 23 09:10:11 np0005593102 puppet-user[63683]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Jan 23 09:10:11 np0005593102 puppet-user[63683]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:11 np0005593102 puppet-user[63683]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:11 np0005593102 puppet-user[63683]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:11 np0005593102 puppet-user[63683]: file names. Jan 23 09:10:11 np0005593102 puppet-user[63683]: Jan 23 09:10:11 np0005593102 puppet-user[63683]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:11 np0005593102 puppet-user[63683]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:11 np0005593102 puppet-user[63683]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:11 np0005593102 puppet-user[63712]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Jan 23 09:10:11 np0005593102 puppet-user[63712]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Jan 23 09:10:11 np0005593102 puppet-user[63712]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:11 np0005593102 puppet-user[63712]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:11 np0005593102 puppet-user[63712]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:11 np0005593102 puppet-user[63712]: file names. Jan 23 09:10:11 np0005593102 puppet-user[63712]: Jan 23 09:10:11 np0005593102 puppet-user[63712]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:11 np0005593102 puppet-user[63712]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:11 np0005593102 puppet-user[63712]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:11 np0005593102 podman[64395]: 2026-01-23 09:10:11.290037497 +0000 UTC m=+0.068411644 container create 880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, distribution-scope=public, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, name=rhosp17/openstack-haproxy, version=17.1.12, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-haproxy, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, release=1761123044, architecture=x86_64, build-date=2025-11-18T22:50:48Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:11 np0005593102 systemd[1]: Started libpod-conmon-880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2.scope. Jan 23 09:10:11 np0005593102 podman[64405]: 2026-01-23 09:10:11.317149493 +0000 UTC m=+0.074215811 container create c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, io.buildah.version=1.41.4, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, build-date=2025-11-19T00:11:00Z, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, com.redhat.component=openstack-heat-api-container, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-heat-api, vcs-type=git, url=https://www.redhat.com, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.12, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=) Jan 23 09:10:11 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:11 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ccbc9f29d40f6a49abcfb1a44ad255d92047ec985adeeda2055fde3dc8372726/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:11 np0005593102 podman[64395]: 2026-01-23 09:10:11.34135694 +0000 UTC m=+0.119731097 container init 880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, io.openshift.expose-services=, architecture=x86_64, container_name=container-puppet-haproxy, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, release=1761123044, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:50:48Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., com.redhat.component=openstack-haproxy-container, url=https://www.redhat.com, io.buildah.version=1.41.4) Jan 23 09:10:11 np0005593102 podman[64395]: 2026-01-23 09:10:11.347486397 +0000 UTC m=+0.125860534 container start 880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, tcib_managed=true, name=rhosp17/openstack-haproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.expose-services=, config_id=tripleo_puppet_step1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T22:50:48Z, com.redhat.component=openstack-haproxy-container, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, container_name=container-puppet-haproxy, version=17.1.12, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:11 np0005593102 podman[64395]: 2026-01-23 09:10:11.347819027 +0000 UTC m=+0.126193214 container attach 880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, release=1761123044, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, build-date=2025-11-18T22:50:48Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, com.redhat.component=openstack-haproxy-container, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, batch=17.1_20251118.1, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1) Jan 23 09:10:11 np0005593102 puppet-user[63725]: Warning: Scope(Apache::Vhost[cinder_wsgi]): Jan 23 09:10:11 np0005593102 puppet-user[63725]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:11 np0005593102 puppet-user[63725]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:11 np0005593102 puppet-user[63725]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:11 np0005593102 puppet-user[63725]: file names. Jan 23 09:10:11 np0005593102 puppet-user[63725]: Jan 23 09:10:11 np0005593102 puppet-user[63725]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:11 np0005593102 puppet-user[63725]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:11 np0005593102 puppet-user[63725]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:11 np0005593102 systemd[1]: Started libpod-conmon-c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661.scope. Jan 23 09:10:11 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:11 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/440664c1e879a9e99e5b72f7829856644d29e4befdb20b6ed810cc120f17e0d4/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:11 np0005593102 podman[64395]: 2026-01-23 09:10:11.26059236 +0000 UTC m=+0.038966527 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Jan 23 09:10:11 np0005593102 podman[64405]: 2026-01-23 09:10:11.364372531 +0000 UTC m=+0.121438849 container init c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, summary=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.buildah.version=1.41.4, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, com.redhat.component=openstack-heat-api-container, release=1761123044, url=https://www.redhat.com, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, container_name=container-puppet-heat_api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., build-date=2025-11-19T00:11:00Z, name=rhosp17/openstack-heat-api, io.openshift.expose-services=, vcs-type=git, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12) Jan 23 09:10:11 np0005593102 podman[64405]: 2026-01-23 09:10:11.371893651 +0000 UTC m=+0.128959969 container start c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-heat_api, tcib_managed=true, com.redhat.component=openstack-heat-api-container, summary=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, distribution-scope=public, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:11:00Z, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp17/openstack-heat-api, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, managed_by=tripleo_ansible, release=1761123044, version=17.1.12, io.openshift.expose-services=, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:11 np0005593102 podman[64405]: 2026-01-23 09:10:11.37221417 +0000 UTC m=+0.129280488 container attach c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, summary=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., release=1761123044, maintainer=OpenStack TripleO Team, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, vcs-type=git, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat_api, url=https://www.redhat.com, build-date=2025-11-19T00:11:00Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, version=17.1.12, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, name=rhosp17/openstack-heat-api, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.component=openstack-heat-api-container, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api) Jan 23 09:10:11 np0005593102 podman[64405]: 2026-01-23 09:10:11.271807782 +0000 UTC m=+0.028874110 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.48 seconds Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.46 seconds Jan 23 09:10:11 np0005593102 puppet-user[63725]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.54 seconds Jan 23 09:10:11 np0005593102 podman[64501]: 2026-01-23 09:10:11.531155791 +0000 UTC m=+0.080261495 container create a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, url=https://www.redhat.com, com.redhat.component=openstack-heat-api-cfn-container, io.buildah.version=1.41.4, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, container_name=container-puppet-heat_api_cfn, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, distribution-scope=public, build-date=2025-11-19T00:10:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, io.openshift.expose-services=, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1, tcib_managed=true, name=rhosp17/openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:11 np0005593102 systemd[1]: Started libpod-conmon-a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1.scope. Jan 23 09:10:11 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:11 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/376c36f1c5d69359d0774d5a5f071e949777848c6082f310a13c33818b43c4c5/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:11 np0005593102 podman[64501]: 2026-01-23 09:10:11.580741941 +0000 UTC m=+0.129847675 container init a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, build-date=2025-11-19T00:10:53Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, version=17.1.12, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, tcib_managed=true, managed_by=tripleo_ansible, name=rhosp17/openstack-heat-api-cfn, com.redhat.component=openstack-heat-api-cfn-container, release=1761123044, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20251118.1, container_name=container-puppet-heat_api_cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public) Jan 23 09:10:11 np0005593102 podman[64501]: 2026-01-23 09:10:11.590322744 +0000 UTC m=+0.139428468 container start a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, url=https://www.redhat.com, io.buildah.version=1.41.4, io.openshift.expose-services=, config_id=tripleo_puppet_step1, container_name=container-puppet-heat_api_cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, release=1761123044, name=rhosp17/openstack-heat-api-cfn, maintainer=OpenStack TripleO Team, version=17.1.12, vcs-type=git, architecture=x86_64, build-date=2025-11-19T00:10:53Z, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.component=openstack-heat-api-cfn-container, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc.) Jan 23 09:10:11 np0005593102 podman[64501]: 2026-01-23 09:10:11.590609782 +0000 UTC m=+0.139715506 container attach a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, name=rhosp17/openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, managed_by=tripleo_ansible, tcib_managed=true, com.redhat.component=openstack-heat-api-cfn-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, vendor=Red Hat, Inc., io.openshift.expose-services=, maintainer=OpenStack TripleO Team, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.buildah.version=1.41.4, container_name=container-puppet-heat_api_cfn, build-date=2025-11-19T00:10:53Z, vcs-type=git, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, release=1761123044, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public, architecture=x86_64, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1) Jan 23 09:10:11 np0005593102 podman[64501]: 2026-01-23 09:10:11.495715592 +0000 UTC m=+0.044821356 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}1c145f21502fe3c074cab31daf474ab0f7292e7c029a3a78d4f5c19d6d857ba5' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}0475d2feb3947b0991da660883a91a5e41f0023e50de2b9486bb889a74cdbacb' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:11 np0005593102 systemd[1]: var-lib-containers-storage-overlay-545cae3549b27cd709724ec7446c4ffee42a4c5fefc42c2ff8f9e8e68f5c75a4-merged.mount: Deactivated successfully. Jan 23 09:10:11 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d61b729c6522d4565f259c974b691bdfeb078bfec17f228947f60a42d871528c-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:11 np0005593102 systemd[1]: var-lib-containers-storage-overlay-2c6a3a746a0f043ea0e30e1b408d980c412c672622279e827abd6ba867a54a89-merged.mount: Deactivated successfully. Jan 23 09:10:11 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-1308dd4bfc8c460e9097d17e0271b2639d0c84e56692f00aa09e7558c5158536-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:11 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:11 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:11 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:11 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Lvm/Augeas[udev options in lvm.conf]/returns: executed successfully Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}1636035a0aa63815c7a05bf2da88228e0ae457d031c278f358bfed64fa8d22c2' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/api_paste_config]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/storage_availability_zone]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/default_availability_zone]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/enable_v3_api]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Glance/Cinder_config[DEFAULT/glance_api_servers]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/region_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/interface]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_type]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}afa23fca9724ce04087ff0ad11312b06baf2b91bc247dedbd27607be2a16bd39' Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_url]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/username]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/user_domain_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/password]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_domain_name]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}1f8768d7e2f74d1dee3cb6ce1b313ffdd71a0778bd39d77e62960122c5a1ab10' Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Cron::Db_purge/Cron[cinder-manage db purge]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_listen]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[64484]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_workers]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/default_volume_type]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Jan 23 09:10:12 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Jan 23 09:10:12 np0005593102 ovs-vsctl[64577]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/auth_strategy]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_workers]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_max_operations]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_driver]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/swift_catalog_info]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_swift_container]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[64491]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:13 np0005593102 puppet-user[64491]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:13 np0005593102 puppet-user[64491]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:13 np0005593102 puppet-user[64491]: (file & line not available) Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_compression_algorithm]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Scheduler/Cinder_config[DEFAULT/scheduler_driver]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[64491]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:13 np0005593102 puppet-user[64491]: (file & line not available) Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[DEFAULT/enabled_backends]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Notice: Applied catalog in 1.74 seconds Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[tripleo_iscsi/backend_host]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63683]: Application: Jan 23 09:10:13 np0005593102 puppet-user[63683]: Initial environment: production Jan 23 09:10:13 np0005593102 puppet-user[63683]: Converged environment: production Jan 23 09:10:13 np0005593102 puppet-user[63683]: Run mode: user Jan 23 09:10:13 np0005593102 puppet-user[63683]: Changes: Jan 23 09:10:13 np0005593102 puppet-user[63683]: Total: 92 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Events: Jan 23 09:10:13 np0005593102 puppet-user[63683]: Success: 92 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Total: 92 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Resources: Jan 23 09:10:13 np0005593102 puppet-user[63683]: Skipped: 36 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Changed: 92 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Out of sync: 92 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Total: 305 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Time: Jan 23 09:10:13 np0005593102 puppet-user[63683]: Concat file: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Anchor: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Concat fragment: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Glance image import config: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Glance swift config: 0.01 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Cron: 0.01 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Glance cache config: 0.01 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Augeas: 0.02 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Package: 0.03 Jan 23 09:10:13 np0005593102 puppet-user[63683]: File: 0.11 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Glance api config: 1.32 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Config retrieval: 1.62 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Transaction evaluation: 1.72 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Catalog application: 1.74 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Last run: 1769159413 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Resources: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Total: 1.74 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Version: Jan 23 09:10:13 np0005593102 puppet-user[63683]: Config: 1769159409 Jan 23 09:10:13 np0005593102 puppet-user[63683]: Puppet: 7.10.0 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Jan 23 09:10:13 np0005593102 ovs-vsctl[64652]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/connection]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/max_retries]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63712]: Notice: Applied catalog in 1.81 seconds Jan 23 09:10:13 np0005593102 puppet-user[63712]: Application: Jan 23 09:10:13 np0005593102 puppet-user[63712]: Initial environment: production Jan 23 09:10:13 np0005593102 puppet-user[63712]: Converged environment: production Jan 23 09:10:13 np0005593102 puppet-user[63712]: Run mode: user Jan 23 09:10:13 np0005593102 puppet-user[63712]: Changes: Jan 23 09:10:13 np0005593102 puppet-user[63712]: Total: 92 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Events: Jan 23 09:10:13 np0005593102 puppet-user[63712]: Success: 92 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Total: 92 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Resources: Jan 23 09:10:13 np0005593102 puppet-user[63712]: Skipped: 36 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Changed: 92 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Out of sync: 92 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Total: 305 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Time: Jan 23 09:10:13 np0005593102 puppet-user[63712]: Concat file: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Anchor: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Concat fragment: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Glance image import config: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Glance swift config: 0.01 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Cron: 0.01 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Glance cache config: 0.01 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Augeas: 0.02 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Package: 0.02 Jan 23 09:10:13 np0005593102 puppet-user[63712]: File: 0.12 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Glance api config: 1.37 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Config retrieval: 1.59 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Transaction evaluation: 1.80 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Catalog application: 1.81 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Last run: 1769159413 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Resources: 0.00 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Total: 1.81 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Version: Jan 23 09:10:13 np0005593102 puppet-user[63712]: Config: 1769159409 Jan 23 09:10:13 np0005593102 puppet-user[63712]: Puppet: 7.10.0 Jan 23 09:10:13 np0005593102 puppet-user[64491]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:13 np0005593102 puppet-user[64491]: removed in a future realse. Use heat::db::database_connection instead Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/db_max_retries]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[64532]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[64532]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:13 np0005593102 puppet-user[64532]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:13 np0005593102 puppet-user[64532]: (file & line not available) Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[64532]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:13 np0005593102 puppet-user[64532]: (file & line not available) Jan 23 09:10:13 np0005593102 puppet-user[64484]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:13 np0005593102 puppet-user[64484]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:13 np0005593102 puppet-user[64484]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:13 np0005593102 puppet-user[64484]: (file & line not available) Jan 23 09:10:13 np0005593102 puppet-user[64532]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:13 np0005593102 puppet-user[64532]: removed in a future realse. Use heat::db::database_connection instead Jan 23 09:10:13 np0005593102 puppet-user[64484]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:13 np0005593102 puppet-user[64484]: (file & line not available) Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/rpc_response_timeout]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/control_exchange]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:13 np0005593102 systemd[1]: libpod-5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce.scope: Deactivated successfully. Jan 23 09:10:13 np0005593102 systemd[1]: libpod-5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce.scope: Consumed 5.590s CPU time. Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder/Oslo::Concurrency[cinder_config]/Cinder_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:13 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/debug]/ensure: created Jan 23 09:10:13 np0005593102 podman[64825]: 2026-01-23 09:10:13.949039853 +0000 UTC m=+0.031270114 container died 5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, name=rhosp17/openstack-glance-api, batch=17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, tcib_managed=true, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-type=git, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, version=17.1.12, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, build-date=2025-11-18T23:45:01Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, release=1761123044, container_name=container-puppet-glance_api_internal) Jan 23 09:10:13 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:13 np0005593102 systemd[1]: var-lib-containers-storage-overlay-cb727e674813e98b08c33959adc3d3a6ef13ef6207c962e5dc3366404c28f66c-merged.mount: Deactivated successfully. Jan 23 09:10:13 np0005593102 systemd[1]: libpod-e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d.scope: Deactivated successfully. Jan 23 09:10:13 np0005593102 systemd[1]: libpod-e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d.scope: Consumed 5.574s CPU time. Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:14 np0005593102 podman[63550]: 2026-01-23 09:10:14.0283933 +0000 UTC m=+6.197840769 container died e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T23:45:01Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., io.buildah.version=1.41.4, version=17.1.12, container_name=container-puppet-glance_api, com.redhat.component=openstack-glance-api-container, io.openshift.expose-services=, vcs-type=git, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, release=1761123044, description=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, architecture=x86_64, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api) Jan 23 09:10:14 np0005593102 podman[64825]: 2026-01-23 09:10:14.104728044 +0000 UTC m=+0.186958325 container cleanup 5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, distribution-scope=public, batch=17.1_20251118.1, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.component=openstack-glance-api-container, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, build-date=2025-11-18T23:45:01Z, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp17/openstack-glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, version=17.1.12, io.buildah.version=1.41.4, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, io.openshift.expose-services=, container_name=container-puppet-glance_api_internal, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 glance-api) Jan 23 09:10:14 np0005593102 systemd[1]: libpod-conmon-5070d68f468926ccb342b907ac182488be69d048c85b2862b2e9aff98375d3ce.scope: Deactivated successfully. Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_type]/ensure: created Jan 23 09:10:14 np0005593102 podman[64853]: 2026-01-23 09:10:14.147582509 +0000 UTC m=+0.110779354 container cleanup e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, vcs-type=git, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-glance-api, url=https://www.redhat.com, version=17.1.12, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, container_name=container-puppet-glance_api, architecture=x86_64, com.redhat.component=openstack-glance-api-container, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, build-date=2025-11-18T23:45:01Z) Jan 23 09:10:14 np0005593102 systemd[1]: libpod-conmon-e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d.scope: Deactivated successfully. Jan 23 09:10:14 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api --conmon-pidfile /run/container-puppet-glance_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::glance::api#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 09:10:14 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api_internal --conmon-pidfile /run/container-puppet-glance_api_internal.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api_internal --env STEP_CONFIG=include ::tripleo::packages#012class { 'tripleo::profile::base::glance::api':#012 bind_port => 9293,#012 tls_proxy_port => 9293,#012 log_file => '/var/log/glance/api_internal.log',#012 show_image_direct_url => true,#012 show_multiple_locations => true,#012}#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api_internal --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api_internal.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/region_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_url]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64484]: Warning: Scope(Haproxy::Config[haproxy]): haproxy: The $merge_options parameter will default to true in the next major release. Please review the documentation regarding the implications. Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/username]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/password]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/user_domain_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_domain_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/send_service_user_token]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Warning: Scope(Apache::Vhost[heat_api_wsgi]): Jan 23 09:10:14 np0005593102 puppet-user[64491]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:14 np0005593102 puppet-user[64491]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:14 np0005593102 puppet-user[64491]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:14 np0005593102 puppet-user[64491]: file names. Jan 23 09:10:14 np0005593102 puppet-user[64491]: Jan 23 09:10:14 np0005593102 puppet-user[64491]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:14 np0005593102 puppet-user[64491]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:14 np0005593102 puppet-user[64491]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:14 np0005593102 puppet-user[64484]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.79 seconds Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.34 seconds Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:14 np0005593102 podman[64968]: 2026-01-23 09:10:14.586326662 +0000 UTC m=+0.066300040 container create 1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, build-date=2025-11-18T23:41:37Z, vendor=Red Hat, Inc., release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, distribution-scope=public, io.openshift.expose-services=, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, summary=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, tcib_managed=true, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 horizon, container_name=container-puppet-horizon, config_id=tripleo_puppet_step1, name=rhosp17/openstack-horizon, com.redhat.component=openstack-horizon-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, batch=17.1_20251118.1) Jan 23 09:10:14 np0005593102 puppet-user[64484]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/content: content changed '{sha256}8afc9a0bcc462f08af54b6ac1cbfc3b8343b1feee00b4ab07d7a8c7b47065f0b' to '{sha256}9cf5b291c3d2e4803c90d43cbf5487dac59a71d96741272258012b8047bdd446' Jan 23 09:10:14 np0005593102 puppet-user[64484]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/mode: mode changed '0644' to '0640' Jan 23 09:10:14 np0005593102 puppet-user[64532]: Warning: Scope(Apache::Vhost[heat_api_cfn_wsgi]): Jan 23 09:10:14 np0005593102 puppet-user[64532]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:14 np0005593102 puppet-user[64532]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:14 np0005593102 puppet-user[64532]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:14 np0005593102 puppet-user[64532]: file names. Jan 23 09:10:14 np0005593102 puppet-user[64532]: Jan 23 09:10:14 np0005593102 puppet-user[64532]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:14 np0005593102 puppet-user[64532]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:14 np0005593102 puppet-user[64532]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:14 np0005593102 systemd[1]: Started libpod-conmon-1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3.scope. Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:14 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:14 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c199e93e91987c3c897355f2e599ef849319c9e7ffdd7e3b8aefc8aec3503715/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:14 np0005593102 puppet-user[64484]: Notice: Applied catalog in 0.19 seconds Jan 23 09:10:14 np0005593102 puppet-user[64484]: Application: Jan 23 09:10:14 np0005593102 puppet-user[64484]: Initial environment: production Jan 23 09:10:14 np0005593102 puppet-user[64484]: Converged environment: production Jan 23 09:10:14 np0005593102 puppet-user[64484]: Run mode: user Jan 23 09:10:14 np0005593102 puppet-user[64484]: Changes: Jan 23 09:10:14 np0005593102 puppet-user[64484]: Total: 2 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Events: Jan 23 09:10:14 np0005593102 puppet-user[64484]: Success: 2 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Total: 2 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Resources: Jan 23 09:10:14 np0005593102 puppet-user[64484]: Changed: 1 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Out of sync: 1 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Skipped: 12 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Total: 54 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Time: Jan 23 09:10:14 np0005593102 puppet-user[64484]: Concat file: 0.00 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Concat fragment: 0.00 Jan 23 09:10:14 np0005593102 puppet-user[64484]: File: 0.07 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Transaction evaluation: 0.18 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Catalog application: 0.19 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Config retrieval: 0.85 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Last run: 1769159414 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Total: 0.19 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Version: Jan 23 09:10:14 np0005593102 puppet-user[64484]: Config: 1769159413 Jan 23 09:10:14 np0005593102 puppet-user[64484]: Puppet: 7.10.0 Jan 23 09:10:14 np0005593102 podman[64968]: 2026-01-23 09:10:14.63253507 +0000 UTC m=+0.112508438 container init 1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, name=rhosp17/openstack-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, distribution-scope=public, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_id=tripleo_puppet_step1, release=1761123044, tcib_managed=true, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., io.openshift.expose-services=, vcs-type=git, batch=17.1_20251118.1, build-date=2025-11-18T23:41:37Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-horizon) Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Policy/Oslo::Policy[cinder_config]/Cinder_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:14 np0005593102 podman[64968]: 2026-01-23 09:10:14.641545895 +0000 UTC m=+0.121519273 container start 1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, description=Red Hat OpenStack Platform 17.1 horizon, summary=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, io.openshift.expose-services=, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, com.redhat.component=openstack-horizon-container, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T23:41:37Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-type=git, name=rhosp17/openstack-horizon, container_name=container-puppet-horizon, architecture=x86_64) Jan 23 09:10:14 np0005593102 podman[64968]: 2026-01-23 09:10:14.64174281 +0000 UTC m=+0.121716208 container attach 1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vendor=Red Hat, Inc., tcib_managed=true, name=rhosp17/openstack-horizon, version=17.1.12, com.redhat.component=openstack-horizon-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, distribution-scope=public, architecture=x86_64, io.openshift.expose-services=, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 horizon, container_name=container-puppet-horizon, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, build-date=2025-11-18T23:41:37Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git) Jan 23 09:10:14 np0005593102 podman[64968]: 2026-01-23 09:10:14.558264238 +0000 UTC m=+0.038237626 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Api/Oslo::Middleware[cinder_config]/Cinder_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:14 np0005593102 podman[64981]: 2026-01-23 09:10:14.688923478 +0000 UTC m=+0.138321375 container create 3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, distribution-scope=public, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat, summary=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, name=rhosp17/openstack-heat-api, io.buildah.version=1.41.4, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-container, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-11-19T00:11:00Z, release=1761123044, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, architecture=x86_64, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:14 np0005593102 podman[64981]: 2026-01-23 09:10:14.601877787 +0000 UTC m=+0.051275654 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[/var/www/cgi-bin/cinder]/group: group changed 'root' to 'cinder' Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[cinder_wsgi]/ensure: defined content as '{sha256}4edb31cc3eee33c28f8a9c6c47aaad65265bca7f5a84782e4481666691daacea' Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_backend_name]/ensure: created Jan 23 09:10:14 np0005593102 systemd[1]: Started libpod-conmon-3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528.scope. Jan 23 09:10:14 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_driver]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64532]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.32 seconds Jan 23 09:10:14 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5d891858c07183c94948d3af3127e232b947138db0f235d4817f770345dc189a/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_ip_address]/ensure: created Jan 23 09:10:14 np0005593102 podman[64981]: 2026-01-23 09:10:14.747313786 +0000 UTC m=+0.196711683 container init 3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, release=1761123044, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, tcib_managed=true, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, build-date=2025-11-19T00:11:00Z, name=rhosp17/openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-heat-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, vcs-type=git, container_name=container-puppet-heat, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, architecture=x86_64, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api) Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_helper]/ensure: created Jan 23 09:10:14 np0005593102 podman[64981]: 2026-01-23 09:10:14.75698114 +0000 UTC m=+0.206379007 container start 3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, config_id=tripleo_puppet_step1, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, name=rhosp17/openstack-heat-api, build-date=2025-11-19T00:11:00Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, architecture=x86_64, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, com.redhat.component=openstack-heat-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, tcib_managed=true, container_name=container-puppet-heat) Jan 23 09:10:14 np0005593102 sshd[65027]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:14 np0005593102 podman[64981]: 2026-01-23 09:10:14.757174596 +0000 UTC m=+0.206572573 container attach 3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, com.redhat.component=openstack-heat-api-container, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, maintainer=OpenStack TripleO Team, container_name=container-puppet-heat, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-11-19T00:11:00Z, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, vendor=Red Hat, Inc., distribution-scope=public, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, config_id=tripleo_puppet_step1, url=https://www.redhat.com, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, name=rhosp17/openstack-heat-api, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volumes_dir]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_protocol]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/Apache::Vhost[cinder_wsgi]/Concat[10-cinder_wsgi.conf]/File[/etc/httpd/conf.d/10-cinder_wsgi.conf]/ensure: defined content as '{sha256}cd115d0528b4f86ffb6a9db3ee7f8743837a5a199b82cff98bffed5b45e6ab4a' Jan 23 09:10:14 np0005593102 puppet-user[63725]: Notice: Applied catalog in 3.18 seconds Jan 23 09:10:14 np0005593102 puppet-user[63725]: Application: Jan 23 09:10:14 np0005593102 puppet-user[63725]: Initial environment: production Jan 23 09:10:14 np0005593102 puppet-user[63725]: Converged environment: production Jan 23 09:10:14 np0005593102 puppet-user[63725]: Run mode: user Jan 23 09:10:14 np0005593102 puppet-user[63725]: Changes: Jan 23 09:10:14 np0005593102 puppet-user[63725]: Total: 114 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Events: Jan 23 09:10:14 np0005593102 puppet-user[63725]: Success: 114 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Total: 114 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Resources: Jan 23 09:10:14 np0005593102 puppet-user[63725]: Changed: 114 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Out of sync: 114 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Skipped: 34 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Total: 372 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Time: Jan 23 09:10:14 np0005593102 puppet-user[63725]: Resources: 0.00 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Concat file: 0.00 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Anchor: 0.00 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Concat fragment: 0.00 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Cron: 0.01 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Package: 0.03 Jan 23 09:10:14 np0005593102 puppet-user[63725]: File: 0.12 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Augeas: 0.55 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Config retrieval: 1.70 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Last run: 1769159414 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Cinder config: 2.22 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Transaction evaluation: 3.17 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Catalog application: 3.18 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Total: 3.18 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Version: Jan 23 09:10:14 np0005593102 puppet-user[63725]: Config: 1769159409 Jan 23 09:10:14 np0005593102 puppet-user[63725]: Puppet: 7.10.0 Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Jan 23 09:10:14 np0005593102 systemd[1]: tmp-crun.yiHhbl.mount: Deactivated successfully. Jan 23 09:10:14 np0005593102 systemd[1]: var-lib-containers-storage-overlay-b74117a1b41b576a6dfa831830f77a19393407f56c70800f65e817e992af2160-merged.mount: Deactivated successfully. Jan 23 09:10:14 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e9be5959d792fd92c95b464438dc4a26152e1c0e21adcf5a6ff7bf674f32ef7d-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:14 np0005593102 systemd[1]: libpod-880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2.scope: Deactivated successfully. Jan 23 09:10:14 np0005593102 systemd[1]: libpod-880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2.scope: Consumed 3.510s CPU time. Jan 23 09:10:14 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Api/Heat_config[heat_api/bind_host]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:15 np0005593102 podman[65072]: 2026-01-23 09:10:15.058227786 +0000 UTC m=+0.064296070 container died 880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 haproxy, batch=17.1_20251118.1, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-haproxy, config_id=tripleo_puppet_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, container_name=container-puppet-haproxy, build-date=2025-11-18T22:50:48Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, url=https://www.redhat.com, com.redhat.component=openstack-haproxy-container, distribution-scope=public, io.openshift.expose-services=, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay-ccbc9f29d40f6a49abcfb1a44ad255d92047ec985adeeda2055fde3dc8372726-merged.mount: Deactivated successfully. Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:15 np0005593102 podman[65072]: 2026-01-23 09:10:15.113163998 +0000 UTC m=+0.119232232 container cleanup 880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 haproxy, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-haproxy-container, config_id=tripleo_puppet_step1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, build-date=2025-11-18T22:50:48Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, url=https://www.redhat.com, version=17.1.12, vcs-type=git, container_name=container-puppet-haproxy, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, io.buildah.version=1.41.4) Jan 23 09:10:15 np0005593102 systemd[1]: libpod-conmon-880ab12f0dc0cdbaf9035b004f5004851be81889f04e6a7bd07ee36d415a9fe2.scope: Deactivated successfully. Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:15 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-haproxy --conmon-pidfile /run/container-puppet-haproxy.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,haproxy_config --env NAME=haproxy --env STEP_CONFIG=include ::tripleo::packages#012exec {'wait-for-settle': command => '/bin/true' }#012class tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}#012['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::haproxy_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-haproxy --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-haproxy.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro --volume /etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro --volume /etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Api_cfn/Heat_config[heat_api_cfn/bind_host]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:15 np0005593102 podman[65160]: 2026-01-23 09:10:15.492570014 +0000 UTC m=+0.101320707 container create 24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, name=rhosp17/openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, build-date=2025-11-18T23:44:13Z, vcs-type=git, architecture=x86_64, vendor=Red Hat, Inc., release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, container_name=container-puppet-iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.component=openstack-iscsid-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.buildah.version=1.41.4, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1) Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Jan 23 09:10:15 np0005593102 podman[65160]: 2026-01-23 09:10:15.43103243 +0000 UTC m=+0.039783123 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:15 np0005593102 systemd[1]: Started libpod-conmon-24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c.scope. Jan 23 09:10:15 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:15 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a00824a05fec86aa929fde6b1f6dc74389ea2308e7087899aad523cba1a0193d/merged/tmp/iscsi.host supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:15 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a00824a05fec86aa929fde6b1f6dc74389ea2308e7087899aad523cba1a0193d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Jan 23 09:10:15 np0005593102 systemd[1]: libpod-c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426.scope: Deactivated successfully. Jan 23 09:10:15 np0005593102 systemd[1]: libpod-c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426.scope: Consumed 7.124s CPU time. Jan 23 09:10:15 np0005593102 podman[65160]: 2026-01-23 09:10:15.56240256 +0000 UTC m=+0.171153223 container init 24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, com.redhat.component=openstack-iscsid-container, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, distribution-scope=public, version=17.1.12, config_id=tripleo_puppet_step1, url=https://www.redhat.com, name=rhosp17/openstack-iscsid, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, build-date=2025-11-18T23:44:13Z, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64, vendor=Red Hat, Inc., container_name=container-puppet-iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, summary=Red Hat OpenStack Platform 17.1 iscsid, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid) Jan 23 09:10:15 np0005593102 podman[63553]: 2026-01-23 09:10:15.564457573 +0000 UTC m=+7.735606574 container died c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-cinder, name=rhosp17/openstack-cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.12, architecture=x86_64, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_puppet_step1, com.redhat.component=openstack-cinder-api-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, tcib_managed=true, release=1761123044, vendor=Red Hat, Inc., build-date=2025-11-19T00:20:06Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git) Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Jan 23 09:10:15 np0005593102 podman[65160]: 2026-01-23 09:10:15.66907535 +0000 UTC m=+0.277826033 container start 24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.buildah.version=1.41.4, com.redhat.component=openstack-iscsid-container, batch=17.1_20251118.1, io.openshift.expose-services=, tcib_managed=true, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., container_name=container-puppet-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 iscsid, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, build-date=2025-11-18T23:44:13Z, url=https://www.redhat.com, distribution-scope=public) Jan 23 09:10:15 np0005593102 podman[65160]: 2026-01-23 09:10:15.669361439 +0000 UTC m=+0.278112122 container attach 24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, distribution-scope=public, io.openshift.expose-services=, tcib_managed=true, batch=17.1_20251118.1, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 iscsid, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, vcs-type=git, io.buildah.version=1.41.4, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, build-date=2025-11-18T23:44:13Z, container_name=container-puppet-iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, release=1761123044, com.redhat.component=openstack-iscsid-container, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:15 np0005593102 podman[65199]: 2026-01-23 09:10:15.678194258 +0000 UTC m=+0.106897877 container cleanup c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, io.buildah.version=1.41.4, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, distribution-scope=public, version=17.1.12, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, com.redhat.component=openstack-cinder-api-container, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, container_name=container-puppet-cinder, name=rhosp17/openstack-cinder-api, build-date=2025-11-19T00:20:06Z, tcib_managed=true, release=1761123044, config_id=tripleo_puppet_step1) Jan 23 09:10:15 np0005593102 systemd[1]: libpod-conmon-c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426.scope: Deactivated successfully. Jan 23 09:10:15 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-cinder --conmon-pidfile /run/container-puppet-cinder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line --env NAME=cinder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::cinder::api#012include tripleo::profile::base::database::mysql::client#012#012include tripleo::profile::base::cinder::backup::swift#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::cinder::backup_bundle#012include tripleo::profile::base::cinder::scheduler#012#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::lvm#012include tripleo::profile::pacemaker::cinder::volume_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-cinder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-cinder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}76bf11d9a4971a40c66431123edee355f4c9e0c51b976b973748505d674a2e62' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[heat_api_wsgi]/ensure: defined content as '{sha256}63c23a972f142aef4c001999d58b5cb122b43aa3aebf0785080bcc6e56385a66' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/Apache::Vhost[heat_api_wsgi]/Concat[10-heat_api_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_wsgi.conf]/ensure: defined content as '{sha256}98f4dcebbebfe7aa1759ee332f6e1795b9bf36d7e1f5d6e5c6441a6c9d2af744' Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Jan 23 09:10:15 np0005593102 puppet-user[64491]: Notice: Applied catalog in 1.24 seconds Jan 23 09:10:15 np0005593102 puppet-user[64491]: Application: Jan 23 09:10:15 np0005593102 puppet-user[64491]: Initial environment: production Jan 23 09:10:15 np0005593102 puppet-user[64491]: Converged environment: production Jan 23 09:10:15 np0005593102 puppet-user[64491]: Run mode: user Jan 23 09:10:15 np0005593102 puppet-user[64491]: Changes: Jan 23 09:10:15 np0005593102 puppet-user[64491]: Total: 89 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Events: Jan 23 09:10:15 np0005593102 puppet-user[64491]: Success: 89 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Total: 89 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Resources: Jan 23 09:10:15 np0005593102 puppet-user[64491]: Skipped: 31 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Changed: 89 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Out of sync: 89 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Total: 331 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Time: Jan 23 09:10:15 np0005593102 puppet-user[64491]: Concat file: 0.00 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Anchor: 0.00 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Concat fragment: 0.00 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Cron: 0.01 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Package: 0.02 Jan 23 09:10:15 np0005593102 puppet-user[64491]: File: 0.12 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Heat config: 0.79 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Transaction evaluation: 1.23 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Catalog application: 1.24 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Config retrieval: 1.55 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Last run: 1769159415 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Resources: 0.00 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Total: 1.24 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Version: Jan 23 09:10:15 np0005593102 puppet-user[64491]: Config: 1769159413 Jan 23 09:10:15 np0005593102 puppet-user[64491]: Puppet: 7.10.0 Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay-14b43d9ecc630ef9f2ed0dc988569746fd8cd010482387ef729f33a7f12ac273-merged.mount: Deactivated successfully. Jan 23 09:10:15 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-c6acc81f4bbb85212182157da1f6b4b098e47aa8daab0b22348d47edcbad8426-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:15 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Jan 23 09:10:16 np0005593102 podman[65288]: 2026-01-23 09:10:16.072532418 +0000 UTC m=+0.052418067 container create eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, architecture=x86_64, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, build-date=2025-11-18T23:45:30Z, vcs-type=git, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 keystone, summary=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-keystone-container, name=rhosp17/openstack-keystone, version=17.1.12, vendor=Red Hat, Inc., distribution-scope=public, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, batch=17.1_20251118.1, container_name=container-puppet-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone) Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}c4d4447f5bfd230068384d9e237a5b783acac9b687531ddce306f823adb26931' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:16 np0005593102 systemd[1]: Started libpod-conmon-eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4.scope. Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:16 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:16 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b3b750d641d7165b654d65aa8185041eab91e423bc5fc830bee91c041ac9d62c/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:16 np0005593102 podman[65288]: 2026-01-23 09:10:16.136135385 +0000 UTC m=+0.116021034 container init eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, release=1761123044, container_name=container-puppet-keystone, batch=17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.component=openstack-keystone-container, vcs-type=git, build-date=2025-11-18T23:45:30Z, description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, io.buildah.version=1.41.4, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, name=rhosp17/openstack-keystone) Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:16 np0005593102 podman[65288]: 2026-01-23 09:10:16.045455533 +0000 UTC m=+0.025341192 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Jan 23 09:10:16 np0005593102 podman[65288]: 2026-01-23 09:10:16.146906983 +0000 UTC m=+0.126792662 container start eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, managed_by=tripleo_ansible, vcs-type=git, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., release=1761123044, config_id=tripleo_puppet_step1, build-date=2025-11-18T23:45:30Z, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp17/openstack-keystone, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, version=17.1.12, distribution-scope=public, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, container_name=container-puppet-keystone, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:16 np0005593102 podman[65288]: 2026-01-23 09:10:16.147120349 +0000 UTC m=+0.127005998 container attach eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, version=17.1.12, managed_by=tripleo_ansible, name=rhosp17/openstack-keystone, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T23:45:30Z, container_name=container-puppet-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., release=1761123044, url=https://www.redhat.com, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64) Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[heat_api_cfn_wsgi]/ensure: defined content as '{sha256}00dfd79a2e891b11ddd21cb5ce9d8c56f440a274b42eb9e7e9616c7c7e326582' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/Apache::Vhost[heat_api_cfn_wsgi]/Concat[10-heat_api_cfn_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_cfn_wsgi.conf]/ensure: defined content as '{sha256}fb9f49c76699e9bb990dd0945e797f707e178ea61f4d5d89cd6605a65c52e44b' Jan 23 09:10:16 np0005593102 puppet-user[64532]: Notice: Applied catalog in 1.29 seconds Jan 23 09:10:16 np0005593102 puppet-user[64532]: Application: Jan 23 09:10:16 np0005593102 puppet-user[64532]: Initial environment: production Jan 23 09:10:16 np0005593102 puppet-user[64532]: Converged environment: production Jan 23 09:10:16 np0005593102 puppet-user[64532]: Run mode: user Jan 23 09:10:16 np0005593102 puppet-user[64532]: Changes: Jan 23 09:10:16 np0005593102 puppet-user[64532]: Total: 90 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Events: Jan 23 09:10:16 np0005593102 puppet-user[64532]: Success: 90 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Total: 90 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Resources: Jan 23 09:10:16 np0005593102 puppet-user[64532]: Skipped: 32 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Changed: 90 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Out of sync: 90 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Total: 333 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Time: Jan 23 09:10:16 np0005593102 puppet-user[64532]: Concat file: 0.00 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Anchor: 0.00 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Concat fragment: 0.00 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Package: 0.02 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Cron: 0.02 Jan 23 09:10:16 np0005593102 puppet-user[64532]: File: 0.11 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Heat config: 0.80 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Transaction evaluation: 1.28 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Catalog application: 1.29 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Config retrieval: 1.57 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Last run: 1769159416 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Resources: 0.00 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Total: 1.29 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Version: Jan 23 09:10:16 np0005593102 puppet-user[64532]: Config: 1769159413 Jan 23 09:10:16 np0005593102 puppet-user[64532]: Puppet: 7.10.0 Jan 23 09:10:16 np0005593102 ovs-vsctl[65364]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:16 np0005593102 systemd[1]: libpod-c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661.scope: Deactivated successfully. Jan 23 09:10:16 np0005593102 systemd[1]: libpod-c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661.scope: Consumed 4.828s CPU time. Jan 23 09:10:16 np0005593102 podman[64405]: 2026-01-23 09:10:16.569782893 +0000 UTC m=+5.326849221 container died c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-heat-api-container, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, version=17.1.12, io.openshift.expose-services=, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-type=git, release=1761123044, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-heat_api, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-11-19T00:11:00Z, architecture=x86_64, managed_by=tripleo_ansible, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, name=rhosp17/openstack-heat-api) Jan 23 09:10:16 np0005593102 puppet-user[65015]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:16 np0005593102 puppet-user[65015]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:16 np0005593102 puppet-user[65015]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:16 np0005593102 puppet-user[65015]: (file & line not available) Jan 23 09:10:16 np0005593102 puppet-user[65015]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:16 np0005593102 puppet-user[65015]: (file & line not available) Jan 23 09:10:16 np0005593102 puppet-user[65044]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:16 np0005593102 puppet-user[65044]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:16 np0005593102 puppet-user[65044]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:16 np0005593102 puppet-user[65044]: (file & line not available) Jan 23 09:10:16 np0005593102 puppet-user[65044]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:16 np0005593102 puppet-user[65044]: (file & line not available) Jan 23 09:10:16 np0005593102 podman[65476]: 2026-01-23 09:10:16.686933971 +0000 UTC m=+0.108241428 container cleanup c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, architecture=x86_64, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, build-date=2025-11-19T00:11:00Z, version=17.1.12, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, release=1761123044, com.redhat.component=openstack-heat-api-container, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, tcib_managed=true, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, container_name=container-puppet-heat_api, summary=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp17/openstack-heat-api, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api) Jan 23 09:10:16 np0005593102 systemd[1]: libpod-conmon-c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661.scope: Deactivated successfully. Jan 23 09:10:16 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api --conmon-pidfile /run/container-puppet-heat_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini --env NAME=heat_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 09:10:16 np0005593102 puppet-user[65044]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:16 np0005593102 puppet-user[65044]: removed in a future realse. Use heat::db::database_connection instead Jan 23 09:10:16 np0005593102 systemd[1]: libpod-a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1.scope: Deactivated successfully. Jan 23 09:10:16 np0005593102 systemd[1]: libpod-a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1.scope: Consumed 4.937s CPU time. Jan 23 09:10:16 np0005593102 podman[64501]: 2026-01-23 09:10:16.918207224 +0000 UTC m=+5.467312938 container died a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, managed_by=tripleo_ansible, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, container_name=container-puppet-heat_api_cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.buildah.version=1.41.4, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, com.redhat.component=openstack-heat-api-cfn-container, maintainer=OpenStack TripleO Team, vcs-type=git, name=rhosp17/openstack-heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-19T00:10:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, batch=17.1_20251118.1, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, distribution-scope=public, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:16 np0005593102 systemd[1]: tmp-crun.gQAHmt.mount: Deactivated successfully. Jan 23 09:10:16 np0005593102 systemd[1]: var-lib-containers-storage-overlay-440664c1e879a9e99e5b72f7829856644d29e4befdb20b6ed810cc120f17e0d4-merged.mount: Deactivated successfully. Jan 23 09:10:16 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-c99fd460a0771c8de05c052648308c71e7343850d154995fc98f3c2f33474661-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:16 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:16 np0005593102 systemd[1]: var-lib-containers-storage-overlay-376c36f1c5d69359d0774d5a5f071e949777848c6082f310a13c33818b43c4c5-merged.mount: Deactivated successfully. Jan 23 09:10:17 np0005593102 podman[65576]: 2026-01-23 09:10:17.013579469 +0000 UTC m=+0.084468764 container cleanup a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, name=rhosp17/openstack-heat-api-cfn, tcib_managed=true, build-date=2025-11-19T00:10:53Z, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-cfn-container, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, container_name=container-puppet-heat_api_cfn, vcs-type=git, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.12, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn) Jan 23 09:10:17 np0005593102 systemd[1]: libpod-conmon-a972a18f5cd2ec6c9c69bf30e1181d141efad3dddea9edb94ca1cae0ce61f7a1.scope: Deactivated successfully. Jan 23 09:10:17 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api_cfn --conmon-pidfile /run/container-puppet-heat_api_cfn.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat_api_cfn --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api_cfn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api_cfn --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api_cfn.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Warning: This parameter is deprecated, please use `internal_proxy`. at ["/etc/puppet/modules/apache/manifests/mod/remoteip.pp", 77]:["/etc/puppet/modules/tripleo/manifests/profile/base/horizon.pp", 103] Jan 23 09:10:17 np0005593102 puppet-user[65015]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Jan 23 09:10:17 np0005593102 podman[65609]: 2026-01-23 09:10:17.127396846 +0000 UTC m=+0.067946980 container create e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, summary=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.4, io.openshift.expose-services=, architecture=x86_64, url=https://www.redhat.com, build-date=2025-11-19T00:21:10Z, version=17.1.12, com.redhat.component=openstack-manila-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, container_name=container-puppet-manila, description=Red Hat OpenStack Platform 17.1 manila-api, release=1761123044, maintainer=OpenStack TripleO Team, vcs-type=git, vendor=Red Hat, Inc., name=rhosp17/openstack-manila-api, tcib_managed=true, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1) Jan 23 09:10:17 np0005593102 systemd[1]: Started libpod-conmon-e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417.scope. Jan 23 09:10:17 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:17 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d9aa1f0ac2d3125a0164d9887496e2d14680b060a51b849edc4c4b1faef57d53/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:17 np0005593102 podman[65609]: 2026-01-23 09:10:17.170641223 +0000 UTC m=+0.111191357 container init e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, build-date=2025-11-19T00:21:10Z, name=rhosp17/openstack-manila-api, io.openshift.expose-services=, io.buildah.version=1.41.4, architecture=x86_64, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, com.redhat.component=openstack-manila-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, managed_by=tripleo_ansible, container_name=container-puppet-manila, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 manila-api, vcs-type=git, distribution-scope=public, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351) Jan 23 09:10:17 np0005593102 podman[65609]: 2026-01-23 09:10:17.177898544 +0000 UTC m=+0.118448688 container start e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 manila-api, url=https://www.redhat.com, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 manila-api, release=1761123044, com.redhat.component=openstack-manila-api-container, io.buildah.version=1.41.4, vendor=Red Hat, Inc., version=17.1.12, name=rhosp17/openstack-manila-api, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, build-date=2025-11-19T00:21:10Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, distribution-scope=public, architecture=x86_64, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, io.openshift.expose-services=, container_name=container-puppet-manila, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api) Jan 23 09:10:17 np0005593102 podman[65609]: 2026-01-23 09:10:17.178722669 +0000 UTC m=+0.119272843 container attach e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, tcib_managed=true, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-manila-api-container, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, container_name=container-puppet-manila, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, build-date=2025-11-19T00:21:10Z, io.buildah.version=1.41.4, name=rhosp17/openstack-manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, url=https://www.redhat.com, release=1761123044, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-type=git) Jan 23 09:10:17 np0005593102 podman[65609]: 2026-01-23 09:10:17.091663677 +0000 UTC m=+0.032213831 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.71 seconds Jan 23 09:10:17 np0005593102 puppet-user[65015]: Warning: Scope(Apache::Vhost[horizon_vhost]): Jan 23 09:10:17 np0005593102 puppet-user[65015]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:17 np0005593102 puppet-user[65015]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:17 np0005593102 puppet-user[65015]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:17 np0005593102 puppet-user[65015]: file names. Jan 23 09:10:17 np0005593102 puppet-user[65015]: Jan 23 09:10:17 np0005593102 puppet-user[65015]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:17 np0005593102 puppet-user[65015]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:17 np0005593102 puppet-user[65015]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:17 np0005593102 puppet-user[65015]: Warning: Scope(Apache::Vhost[horizon_ssl_vhost]): Jan 23 09:10:17 np0005593102 puppet-user[65015]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:17 np0005593102 puppet-user[65015]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:17 np0005593102 puppet-user[65015]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:17 np0005593102 puppet-user[65015]: file names. Jan 23 09:10:17 np0005593102 puppet-user[65015]: Jan 23 09:10:17 np0005593102 puppet-user[65015]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:17 np0005593102 puppet-user[65015]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:17 np0005593102 puppet-user[65015]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:17 np0005593102 podman[65687]: 2026-01-23 09:10:17.400553346 +0000 UTC m=+0.060179645 container create 68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, com.redhat.component=openstack-memcached-container, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, batch=17.1_20251118.1, managed_by=tripleo_ansible, distribution-scope=public, url=https://www.redhat.com, build-date=2025-11-18T22:49:49Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-memcached, config_id=tripleo_puppet_step1, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc.) Jan 23 09:10:17 np0005593102 systemd[1]: Started libpod-conmon-68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e.scope. Jan 23 09:10:17 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:17 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f8c368d14010506a17269e35d0f21a7e5e9d85bec73a2cc91f2acb26c2e8217d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:17 np0005593102 podman[65687]: 2026-01-23 09:10:17.437240153 +0000 UTC m=+0.096866452 container init 68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, vcs-type=git, com.redhat.component=openstack-memcached-container, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, name=rhosp17/openstack-memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, build-date=2025-11-18T22:49:49Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, url=https://www.redhat.com, managed_by=tripleo_ansible, version=17.1.12, batch=17.1_20251118.1, container_name=container-puppet-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, release=1761123044, description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached) Jan 23 09:10:17 np0005593102 podman[65687]: 2026-01-23 09:10:17.444830534 +0000 UTC m=+0.104456833 container start 68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, io.openshift.expose-services=, release=1761123044, description=Red Hat OpenStack Platform 17.1 memcached, build-date=2025-11-18T22:49:49Z, tcib_managed=true, name=rhosp17/openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., com.redhat.component=openstack-memcached-container, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, batch=17.1_20251118.1) Jan 23 09:10:17 np0005593102 podman[65687]: 2026-01-23 09:10:17.447837076 +0000 UTC m=+0.107463375 container attach 68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, build-date=2025-11-18T22:49:49Z, distribution-scope=public, vendor=Red Hat, Inc., architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, url=https://www.redhat.com, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-memcached, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, release=1761123044, version=17.1.12, config_id=tripleo_puppet_step1, com.redhat.component=openstack-memcached-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible) Jan 23 09:10:17 np0005593102 podman[65687]: 2026-01-23 09:10:17.366405475 +0000 UTC m=+0.026031794 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65225]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:17 np0005593102 puppet-user[65225]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65225]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:17 np0005593102 puppet-user[65225]: (file & line not available) Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.96 seconds Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65225]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:17 np0005593102 puppet-user[65225]: (file & line not available) Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65225]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.10 seconds Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/auth_encryption_key]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_metadata_server_url]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_waitcondition_server_url]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65225]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[reset-iscsi-initiator-name]/returns: executed successfully Jan 23 09:10:17 np0005593102 puppet-user[65225]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/File[/etc/iscsi/.initiator_reset]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65225]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[sync-iqn-to-host]/returns: executed successfully Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/trusts_delegated_roles]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_resources_per_stack]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Remoteip/File[remoteip.conf]/ensure: defined content as '{sha256}9c8d4355af8c0547dc87c380e06a19f272a0bd3fac83afce5f8eb116cf574c2e' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon/File[/etc/openstack-dashboard/local_settings.d]/mode: mode changed '0750' to '0755' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon]/mode: mode changed '0750' to '0751' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon/horizon.log]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/num_engine_workers]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}2e1c062760262de640de7fb32f6a3595b97b0478924337d552b4cd7903d72fe0' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/convergence_engine]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/reauthentication_auth_method]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_nested_stack_depth]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/client_retry_limit]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Remoteip/Apache::Mod[remoteip]/File[remoteip.load]/ensure: defined content as '{sha256}3977211787f6c6bf5629e4156b32d1dc95c37bc640452d0027b2bc9b1ec9f2d7' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon/Concat[/etc/openstack-dashboard/local_settings]/File[/etc/openstack-dashboard/local_settings]/content: content changed '{sha256}bb0e13a0afbf37de0b90c300eea7d75d3db826936a1effc1acf58205f154b6f2' to '{sha256}da7acbb40ab05f71335d492fa8acec9c547546daaac1458b6f079011b750f19b' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/etc/httpd/conf.d/openstack-dashboard.conf]/content: content changed '{sha256}2674ec0a2b4f3412930e918216e5698d5bc877be4364105136866cad3f2ae4bb' to '{sha256}5c3c01834d94a99528a118d4a02978297ac0bf0250e0729c7e4bbd47d4865680' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Alias/File[alias.conf]/ensure: defined content as '{sha256}8c17a7de4a27d92b2aca6b156dca9e26b9e0bf31b8cc43f63c971aeed09d4e54' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon::Dashboards::Heat/Concat[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/File[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/ensure: defined content as '{sha256}dd44da5c856beb5e53df88fc72180a79669b73c9c04d487b5033290279692113' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/content: content changed '{sha256}30de7bbf440460cde78da0e2cf1cab2404921ef0b0e926f5ebaaf973dc4252c5' to '{sha256}838e0d57b7536ffc538afd2e4d916f26ccb29380c13563d0f1ef51d676112c34' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/group: group changed 'root' to 'apache' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/mode: mode changed '0644' to '0640' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache::Mod::Alias/Apache::Mod[alias]/File[alias.load]/ensure: defined content as '{sha256}824016275330b45fd8bd04b07792de5f9aaa337f8272bfc01c5b57bb515fc9b4' Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_vhost]/Concat[10-horizon_vhost.conf]/File[/etc/httpd/conf.d/10-horizon_vhost.conf]/ensure: defined content as '{sha256}26556033225c4ceed780b6984544b9d271ce5bfea5d4e73bcb4661709c690c2b' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_ssl_vhost]/Concat[15-horizon_ssl_vhost.conf]/File[/etc/httpd/conf.d/15-horizon_ssl_vhost.conf]/ensure: defined content as '{sha256}bbec4d5042bf76cfddb1024715640fc630cfbba677bb4def02bb8c820900b899' Jan 23 09:10:17 np0005593102 puppet-user[65015]: Notice: Applied catalog in 0.31 seconds Jan 23 09:10:17 np0005593102 puppet-user[65015]: Application: Jan 23 09:10:17 np0005593102 puppet-user[65015]: Initial environment: production Jan 23 09:10:17 np0005593102 puppet-user[65015]: Converged environment: production Jan 23 09:10:17 np0005593102 puppet-user[65015]: Run mode: user Jan 23 09:10:17 np0005593102 puppet-user[65015]: Changes: Jan 23 09:10:17 np0005593102 puppet-user[65015]: Total: 50 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Events: Jan 23 09:10:17 np0005593102 puppet-user[65015]: Success: 50 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Total: 50 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Resources: Jan 23 09:10:17 np0005593102 puppet-user[65015]: Skipped: 33 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Changed: 48 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Out of sync: 48 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Total: 140 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Time: Jan 23 09:10:17 np0005593102 puppet-user[65015]: Concat file: 0.00 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Concat fragment: 0.00 Jan 23 09:10:17 np0005593102 puppet-user[65015]: File: 0.15 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Transaction evaluation: 0.30 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Catalog application: 0.31 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Config retrieval: 1.06 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Last run: 1769159417 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Total: 0.31 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Version: Jan 23 09:10:17 np0005593102 puppet-user[65015]: Config: 1769159416 Jan 23 09:10:17 np0005593102 puppet-user[65015]: Puppet: 7.10.0 Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:17 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65317]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:18 np0005593102 puppet-user[65317]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:18 np0005593102 puppet-user[65317]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:18 np0005593102 puppet-user[65317]: (file & line not available) Jan 23 09:10:18 np0005593102 puppet-user[65225]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Augeas[chap_algs in /etc/iscsi/iscsid.conf]/returns: executed successfully Jan 23 09:10:18 np0005593102 puppet-user[65225]: Notice: Applied catalog in 0.44 seconds Jan 23 09:10:18 np0005593102 puppet-user[65225]: Application: Jan 23 09:10:18 np0005593102 puppet-user[65225]: Initial environment: production Jan 23 09:10:18 np0005593102 puppet-user[65225]: Converged environment: production Jan 23 09:10:18 np0005593102 puppet-user[65225]: Run mode: user Jan 23 09:10:18 np0005593102 puppet-user[65225]: Changes: Jan 23 09:10:18 np0005593102 puppet-user[65225]: Total: 4 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Events: Jan 23 09:10:18 np0005593102 puppet-user[65225]: Success: 4 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Total: 4 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Resources: Jan 23 09:10:18 np0005593102 puppet-user[65225]: Changed: 4 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Out of sync: 4 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Skipped: 8 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Total: 13 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Time: Jan 23 09:10:18 np0005593102 puppet-user[65225]: File: 0.00 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Exec: 0.04 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Config retrieval: 0.13 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Augeas: 0.38 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Transaction evaluation: 0.44 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Catalog application: 0.44 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Last run: 1769159418 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Total: 0.44 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Version: Jan 23 09:10:18 np0005593102 puppet-user[65225]: Config: 1769159417 Jan 23 09:10:18 np0005593102 puppet-user[65225]: Puppet: 7.10.0 Jan 23 09:10:18 np0005593102 puppet-user[65317]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:18 np0005593102 puppet-user[65317]: (file & line not available) Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Jan 23 09:10:18 np0005593102 systemd[1]: libpod-24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c.scope: Deactivated successfully. Jan 23 09:10:18 np0005593102 systemd[1]: libpod-24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c.scope: Consumed 2.572s CPU time. Jan 23 09:10:18 np0005593102 puppet-user[65317]: Notice: Accepting previously invalid value for target type 'Enum['sql', 'template']' Jan 23 09:10:18 np0005593102 puppet-user[65317]: Warning: Scope(Class[Keystone]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:18 np0005593102 puppet-user[65317]: removed in a future realse. Use keystone::db::database_connection instead Jan 23 09:10:18 np0005593102 podman[65160]: 2026-01-23 09:10:18.367737773 +0000 UTC m=+2.976488446 container died 24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.component=openstack-iscsid-container, distribution-scope=public, version=17.1.12, description=Red Hat OpenStack Platform 17.1 iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, io.buildah.version=1.41.4, container_name=container-puppet-iscsid, release=1761123044, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_puppet_step1, name=rhosp17/openstack-iscsid, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, build-date=2025-11-18T23:44:13Z, managed_by=tripleo_ansible, vendor=Red Hat, Inc., vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64) Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Jan 23 09:10:18 np0005593102 systemd[1]: libpod-1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3.scope: Deactivated successfully. Jan 23 09:10:18 np0005593102 systemd[1]: libpod-1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3.scope: Consumed 3.557s CPU time. Jan 23 09:10:18 np0005593102 podman[64968]: 2026-01-23 09:10:18.419088517 +0000 UTC m=+3.899061905 container died 1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, name=rhosp17/openstack-horizon, architecture=x86_64, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, vendor=Red Hat, Inc., io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T23:41:37Z, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-type=git, url=https://www.redhat.com, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-horizon, config_id=tripleo_puppet_step1, release=1761123044, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 horizon) Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:18 np0005593102 puppet-user[65044]: Notice: Applied catalog in 1.05 seconds Jan 23 09:10:18 np0005593102 puppet-user[65044]: Application: Jan 23 09:10:18 np0005593102 puppet-user[65044]: Initial environment: production Jan 23 09:10:18 np0005593102 puppet-user[65044]: Converged environment: production Jan 23 09:10:18 np0005593102 puppet-user[65044]: Run mode: user Jan 23 09:10:18 np0005593102 puppet-user[65044]: Changes: Jan 23 09:10:18 np0005593102 puppet-user[65044]: Total: 61 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Events: Jan 23 09:10:18 np0005593102 puppet-user[65044]: Success: 61 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Total: 61 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Resources: Jan 23 09:10:18 np0005593102 puppet-user[65044]: Skipped: 21 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Changed: 61 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Out of sync: 61 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Total: 259 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Time: Jan 23 09:10:18 np0005593102 puppet-user[65044]: Anchor: 0.00 Jan 23 09:10:18 np0005593102 puppet-user[65044]: File: 0.00 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Cron: 0.01 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Augeas: 0.02 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Package: 0.03 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Config retrieval: 0.82 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Heat config: 0.87 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Transaction evaluation: 1.04 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Catalog application: 1.05 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Last run: 1769159418 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Resources: 0.00 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Total: 1.05 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Version: Jan 23 09:10:18 np0005593102 puppet-user[65044]: Config: 1769159416 Jan 23 09:10:18 np0005593102 puppet-user[65044]: Puppet: 7.10.0 Jan 23 09:10:18 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:18 np0005593102 systemd[1]: var-lib-containers-storage-overlay-a00824a05fec86aa929fde6b1f6dc74389ea2308e7087899aad523cba1a0193d-merged.mount: Deactivated successfully. Jan 23 09:10:18 np0005593102 podman[65924]: 2026-01-23 09:10:18.518066162 +0000 UTC m=+0.142962635 container cleanup 24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, vendor=Red Hat, Inc., io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, build-date=2025-11-18T23:44:13Z, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20251118.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=container-puppet-iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, com.redhat.component=openstack-iscsid-container, release=1761123044, name=rhosp17/openstack-iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4) Jan 23 09:10:18 np0005593102 podman[65941]: 2026-01-23 09:10:18.529947944 +0000 UTC m=+0.105100643 container cleanup 1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, release=1761123044, vcs-type=git, name=rhosp17/openstack-horizon, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-horizon-container, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, build-date=2025-11-18T23:41:37Z, config_id=tripleo_puppet_step1, container_name=container-puppet-horizon, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, version=17.1.12, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, distribution-scope=public) Jan 23 09:10:18 np0005593102 systemd[1]: libpod-conmon-24d2676953aaea20836aad7c9f651870ff542bf69f21b23b1378718f6cb8702c.scope: Deactivated successfully. Jan 23 09:10:18 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-iscsid --conmon-pidfile /run/container-puppet-iscsid.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,iscsid_config --env NAME=iscsid --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::iscsid#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-iscsid --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-iscsid.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/iscsi:/tmp/iscsi.host:z --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Jan 23 09:10:18 np0005593102 systemd[1]: libpod-conmon-1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3.scope: Deactivated successfully. Jan 23 09:10:18 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-horizon --conmon-pidfile /run/container-puppet-horizon.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,horizon_config --env NAME=horizon --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::horizon#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-horizon --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-horizon.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Jan 23 09:10:18 np0005593102 podman[66041]: 2026-01-23 09:10:18.850837287 +0000 UTC m=+0.063291089 container create dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., name=rhosp17/openstack-qdrouterd, managed_by=tripleo_ansible, url=https://www.redhat.com, build-date=2025-11-18T22:49:46Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, version=17.1.12, io.buildah.version=1.41.4, vcs-type=git, config_id=tripleo_puppet_step1, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-metrics_qdr) Jan 23 09:10:18 np0005593102 systemd[1]: Started libpod-conmon-dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e.scope. Jan 23 09:10:18 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:18 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c278e4ebde8e18f4a95b15b10f71a1455926ce3f1c92b862858bd9ab7833f482/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:18 np0005593102 podman[66041]: 2026-01-23 09:10:18.898875169 +0000 UTC m=+0.111329001 container init dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, com.redhat.component=openstack-qdrouterd-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, version=17.1.12, container_name=container-puppet-metrics_qdr, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, build-date=2025-11-18T22:49:46Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, tcib_managed=true, io.buildah.version=1.41.4, name=rhosp17/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., url=https://www.redhat.com, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd) Jan 23 09:10:18 np0005593102 podman[66041]: 2026-01-23 09:10:18.905608955 +0000 UTC m=+0.118062797 container start dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.openshift.expose-services=, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, com.redhat.component=openstack-qdrouterd-container, build-date=2025-11-18T22:49:46Z, version=17.1.12, distribution-scope=public, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, name=rhosp17/openstack-qdrouterd, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=container-puppet-metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, batch=17.1_20251118.1, url=https://www.redhat.com) Jan 23 09:10:18 np0005593102 podman[66041]: 2026-01-23 09:10:18.905919184 +0000 UTC m=+0.118373007 container attach dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=container-puppet-metrics_qdr, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, managed_by=tripleo_ansible, release=1761123044, version=17.1.12, name=rhosp17/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:46Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, tcib_managed=true, vcs-type=git, io.openshift.expose-services=, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:18 np0005593102 podman[66041]: 2026-01-23 09:10:18.816197082 +0000 UTC m=+0.028650904 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:10:18 np0005593102 systemd[1]: var-lib-containers-storage-overlay-c199e93e91987c3c897355f2e599ef849319c9e7ffdd7e3b8aefc8aec3503715-merged.mount: Deactivated successfully. Jan 23 09:10:18 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-1db77a8840028bbfb6aa3f00b48738ab1963e0b92920db7f4ed0de94d522cbf3-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:18 np0005593102 systemd[1]: libpod-3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528.scope: Deactivated successfully. Jan 23 09:10:18 np0005593102 systemd[1]: libpod-3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528.scope: Consumed 4.027s CPU time. Jan 23 09:10:19 np0005593102 puppet-user[65661]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:19 np0005593102 puppet-user[65661]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:19 np0005593102 puppet-user[65661]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:19 np0005593102 puppet-user[65661]: (file & line not available) Jan 23 09:10:19 np0005593102 podman[66149]: 2026-01-23 09:10:19.058442769 +0000 UTC m=+0.055336825 container died 3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-heat, com.redhat.component=openstack-heat-api-container, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, vcs-type=git, vendor=Red Hat, Inc., build-date=2025-11-19T00:11:00Z, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.buildah.version=1.41.4, tcib_managed=true, architecture=x86_64, name=rhosp17/openstack-heat-api, config_id=tripleo_puppet_step1, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:19 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:19 np0005593102 systemd[1]: var-lib-containers-storage-overlay-5d891858c07183c94948d3af3127e232b947138db0f235d4817f770345dc189a-merged.mount: Deactivated successfully. Jan 23 09:10:19 np0005593102 podman[66149]: 2026-01-23 09:10:19.083619616 +0000 UTC m=+0.080513612 container cleanup 3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.component=openstack-heat-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-19T00:11:00Z, version=17.1.12, name=rhosp17/openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, managed_by=tripleo_ansible, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, container_name=container-puppet-heat, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, distribution-scope=public, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd) Jan 23 09:10:19 np0005593102 puppet-user[65661]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:19 np0005593102 puppet-user[65661]: (file & line not available) Jan 23 09:10:19 np0005593102 systemd[1]: libpod-conmon-3588f8f1de7ebf633b5f80a31b7aeb72fcacc7e3cb2ff745048f65558e67d528.scope: Deactivated successfully. Jan 23 09:10:19 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat --conmon-pidfile /run/container-puppet-heat.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::engine#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 09:10:19 np0005593102 puppet-user[65317]: Warning: Scope(Apache::Vhost[keystone_wsgi]): Jan 23 09:10:19 np0005593102 puppet-user[65317]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:19 np0005593102 puppet-user[65317]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:19 np0005593102 puppet-user[65317]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:19 np0005593102 puppet-user[65317]: file names. Jan 23 09:10:19 np0005593102 puppet-user[65317]: Jan 23 09:10:19 np0005593102 puppet-user[65317]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:19 np0005593102 puppet-user[65317]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:19 np0005593102 puppet-user[65317]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:19 np0005593102 puppet-user[65661]: Warning: Scope(Class[Manila]): The sql_connection parameter is deprecated and will be \ Jan 23 09:10:19 np0005593102 puppet-user[65661]: removed in a future realse. Use manila::db::database_connection instead Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.24 seconds Jan 23 09:10:19 np0005593102 puppet-user[65767]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:19 np0005593102 puppet-user[65767]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:19 np0005593102 puppet-user[65767]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:19 np0005593102 puppet-user[65767]: (file & line not available) Jan 23 09:10:19 np0005593102 puppet-user[65767]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:19 np0005593102 puppet-user[65767]: (file & line not available) Jan 23 09:10:19 np0005593102 puppet-user[65767]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.08 seconds Jan 23 09:10:19 np0005593102 puppet-user[65767]: Notice: /Stage[main]/Memcached/File[/etc/sysconfig/memcached]/content: content changed '{sha256}31f7d20fad86bdd2bc5692619928af8785dc0e9f858863aeece67cff0e4edfd2' to '{sha256}7c2650287cf20687426421456e794d4ae5d8cee06a9adca8c03a7539178461d8' Jan 23 09:10:19 np0005593102 puppet-user[65767]: Notice: Applied catalog in 0.01 seconds Jan 23 09:10:19 np0005593102 puppet-user[65767]: Application: Jan 23 09:10:19 np0005593102 puppet-user[65767]: Initial environment: production Jan 23 09:10:19 np0005593102 puppet-user[65767]: Converged environment: production Jan 23 09:10:19 np0005593102 puppet-user[65767]: Run mode: user Jan 23 09:10:19 np0005593102 puppet-user[65767]: Changes: Jan 23 09:10:19 np0005593102 puppet-user[65767]: Total: 1 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Events: Jan 23 09:10:19 np0005593102 puppet-user[65767]: Success: 1 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Total: 1 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Resources: Jan 23 09:10:19 np0005593102 puppet-user[65767]: Changed: 1 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Out of sync: 1 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Skipped: 9 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Total: 10 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Time: Jan 23 09:10:19 np0005593102 puppet-user[65767]: File: 0.01 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Transaction evaluation: 0.01 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Catalog application: 0.01 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Config retrieval: 0.12 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Last run: 1769159419 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Total: 0.02 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Version: Jan 23 09:10:19 np0005593102 puppet-user[65767]: Config: 1769159419 Jan 23 09:10:19 np0005593102 puppet-user[65767]: Puppet: 7.10.0 Jan 23 09:10:19 np0005593102 podman[66287]: 2026-01-23 09:10:19.442638902 +0000 UTC m=+0.062582768 container create 32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-neutron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, version=17.1.12, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, architecture=x86_64, release=1761123044, vcs-type=git, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.openshift.expose-services=, build-date=2025-11-19T00:23:27Z, name=rhosp17/openstack-neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, url=https://www.redhat.com) Jan 23 09:10:19 np0005593102 systemd[1]: Started libpod-conmon-32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb.scope. Jan 23 09:10:19 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:19 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/652934ae958b526b6e13c168dae216de22c5effdd2d9863438e808c872f7dfd3/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:19 np0005593102 podman[66287]: 2026-01-23 09:10:19.498489693 +0000 UTC m=+0.118433539 container init 32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, build-date=2025-11-19T00:23:27Z, io.buildah.version=1.41.4, release=1761123044, distribution-scope=public, container_name=container-puppet-neutron, vendor=Red Hat, Inc., vcs-type=git, architecture=x86_64, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, summary=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, version=17.1.12, io.openshift.expose-services=, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, name=rhosp17/openstack-neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true) Jan 23 09:10:19 np0005593102 podman[66287]: 2026-01-23 09:10:19.504040822 +0000 UTC m=+0.123984668 container start 32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, summary=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, container_name=container-puppet-neutron, vendor=Red Hat, Inc., architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, build-date=2025-11-19T00:23:27Z, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-neutron-server-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_puppet_step1, release=1761123044, url=https://www.redhat.com, version=17.1.12, name=rhosp17/openstack-neutron-server, io.buildah.version=1.41.4, vcs-type=git) Jan 23 09:10:19 np0005593102 podman[66287]: 2026-01-23 09:10:19.504417933 +0000 UTC m=+0.124361779 container attach 32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, description=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, build-date=2025-11-19T00:23:27Z, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, url=https://www.redhat.com, com.redhat.component=openstack-neutron-server-container, container_name=container-puppet-neutron, version=17.1.12, vcs-type=git, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, distribution-scope=public, vendor=Red Hat, Inc., io.buildah.version=1.41.4, tcib_managed=true, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, release=1761123044, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-neutron-server) Jan 23 09:10:19 np0005593102 podman[66287]: 2026-01-23 09:10:19.41272446 +0000 UTC m=+0.032668326 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[token/expiration]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/enable]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/certfile]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/keyfile]/ensure: created Jan 23 09:10:19 np0005593102 systemd[1]: libpod-68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e.scope: Deactivated successfully. Jan 23 09:10:19 np0005593102 systemd[1]: libpod-68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e.scope: Consumed 2.004s CPU time. Jan 23 09:10:19 np0005593102 podman[65687]: 2026-01-23 09:10:19.604196912 +0000 UTC m=+2.263823291 container died 68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-memcached, batch=17.1_20251118.1, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-memcached, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., vcs-type=git, com.redhat.component=openstack-memcached-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, build-date=2025-11-18T22:49:49Z, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_certs]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_key]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/cert_subject]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/driver]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/template_file]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[token/provider]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[DEFAULT/notification_format]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/0]/ensure: defined content as '{sha256}56869bd921cd6e48bfb60c3f9e3a55cae893a9be0916a32e07f8176dde8e30e9' Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/1]/ensure: defined content as '{sha256}bbac5aade02e6c8ae19886b0dd73b354c8c3022ab9d452c92e6672ad6da36fe4' Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys]/ensure: created Jan 23 09:10:19 np0005593102 podman[66352]: 2026-01-23 09:10:19.66977601 +0000 UTC m=+0.057347219 container cleanup 68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, batch=17.1_20251118.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, container_name=container-puppet-memcached, com.redhat.component=openstack-memcached-container, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, version=17.1.12, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, release=1761123044, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, vcs-type=git) Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/0]/ensure: defined content as '{sha256}b115f7eadd52c7f62cb88f529c8ba2d2a484ffdaf31a8a7267ea430b8dd54392' Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/1]/ensure: defined content as '{sha256}3f993a1373164915a04455a2b9b0f837407e59fa05cb35b5fc923690f52b0982' Jan 23 09:10:19 np0005593102 systemd[1]: libpod-conmon-68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e.scope: Deactivated successfully. Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/key_repository]/ensure: created Jan 23 09:10:19 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-memcached --conmon-pidfile /run/container-puppet-memcached.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=memcached --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::memcached#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-memcached --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-memcached.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[token/revoke_by_id]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/max_active_keys]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Keystone_config[credential/key_repository]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Cron::Trust_flush/Cron[keystone-manage trust_flush]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend_argument]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/enabled]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/memcache_servers]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/tls_enabled]/ensure: created Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/debug]/ensure: created Jan 23 09:10:19 np0005593102 sshd[66445]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:19 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:19 np0005593102 podman[66424]: 2026-01-23 09:10:19.935873544 +0000 UTC m=+0.076359657 container create 4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, managed_by=tripleo_ansible, container_name=container-puppet-mysql, distribution-scope=public, build-date=2025-11-18T22:51:13Z, vcs-type=git, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, version=17.1.12, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb) Jan 23 09:10:19 np0005593102 systemd[1]: Started libpod-conmon-4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559.scope. Jan 23 09:10:19 np0005593102 systemd[1]: var-lib-containers-storage-overlay-f8c368d14010506a17269e35d0f21a7e5e9d85bec73a2cc91f2acb26c2e8217d-merged.mount: Deactivated successfully. Jan 23 09:10:19 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-68947cd38c5358e24b7ceba173567a78bbf5ed24817558dd44b3825cb4e33c1e-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:19 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:19 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/cc809a0eb0f645c72c0c634dcbd1f8878b83ecf8edd3c8f88378e136eaf98539/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:19 np0005593102 podman[66424]: 2026-01-23 09:10:19.978736189 +0000 UTC m=+0.119222302 container init 4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.buildah.version=1.41.4, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., managed_by=tripleo_ansible, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, maintainer=OpenStack TripleO Team, vcs-type=git, container_name=container-puppet-mysql, name=rhosp17/openstack-mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1761123044, io.openshift.expose-services=, com.redhat.component=openstack-mariadb-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:19 np0005593102 podman[66424]: 2026-01-23 09:10:19.983383971 +0000 UTC m=+0.123870094 container start 4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, com.redhat.component=openstack-mariadb-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, name=rhosp17/openstack-mariadb, architecture=x86_64, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, batch=17.1_20251118.1, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-mysql, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1761123044, url=https://www.redhat.com, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:19 np0005593102 podman[66424]: 2026-01-23 09:10:19.983556647 +0000 UTC m=+0.124042750 container attach 4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, build-date=2025-11-18T22:51:13Z, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-mysql, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., release=1761123044, name=rhosp17/openstack-mariadb, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20251118.1, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/manila/manifests/share.pp, line: 50, column: 18) Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Policy/Oslo::Policy[keystone_config]/Keystone_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:20 np0005593102 podman[66424]: 2026-01-23 09:10:19.90585884 +0000 UTC m=+0.046344973 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Unknown variable: 'manila_generic_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 292, column: 48) Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Unknown variable: 'manila_netapp_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 294, column: 39) Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Unknown variable: 'manila_vmax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 295, column: 39) Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Unknown variable: 'manila_powermax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 296, column: 39) Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Unknown variable: 'manila_isilon_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 297, column: 39) Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Unknown variable: 'manila_unity_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 298, column: 39) Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Unknown variable: 'manila_vnx_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 299, column: 39) Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Unknown variable: 'manila_flashblade_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 300, column: 39) Jan 23 09:10:20 np0005593102 podman[66463]: 2026-01-23 09:10:20.06544546 +0000 UTC m=+0.077182592 container create 2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.component=openstack-nova-api-container, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, tcib_managed=true, build-date=2025-11-19T00:34:57Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, release=1761123044, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, container_name=container-puppet-nova, name=rhosp17/openstack-nova-api, vendor=Red Hat, Inc., version=17.1.12, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/connection]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/max_retries]/ensure: created Jan 23 09:10:20 np0005593102 systemd[1]: Started libpod-conmon-2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce.scope. Jan 23 09:10:20 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:20 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6f75752afc89c041da49eb99ca7cd6f0a7cadd2a62d19f8e5681d51766ce02de/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:20 np0005593102 podman[66463]: 2026-01-23 09:10:20.125127058 +0000 UTC m=+0.136864180 container init 2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.12, container_name=container-puppet-nova, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, url=https://www.redhat.com, distribution-scope=public, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, build-date=2025-11-19T00:34:57Z, vcs-type=git, release=1761123044, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api) Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/db_max_retries]/ensure: created Jan 23 09:10:20 np0005593102 podman[66463]: 2026-01-23 09:10:20.13078103 +0000 UTC m=+0.142518192 container start 2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, url=https://www.redhat.com, distribution-scope=public, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, version=17.1.12, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, maintainer=OpenStack TripleO Team, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, build-date=2025-11-19T00:34:57Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, container_name=container-puppet-nova, config_id=tripleo_puppet_step1, name=rhosp17/openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc.) Jan 23 09:10:20 np0005593102 podman[66463]: 2026-01-23 09:10:20.032919949 +0000 UTC m=+0.044657091 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 09:10:20 np0005593102 podman[66463]: 2026-01-23 09:10:20.132195684 +0000 UTC m=+0.143932826 container attach 2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, release=1761123044, description=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-nova, name=rhosp17/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, config_id=tripleo_puppet_step1, distribution-scope=public, io.buildah.version=1.41.4, url=https://www.redhat.com, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, vendor=Red Hat, Inc., batch=17.1_20251118.1, version=17.1.12, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-19T00:34:57Z, vcs-type=git, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api) Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Oslo::Middleware[keystone_config]/Keystone_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Default[keystone_config]/Keystone_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/topics]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}ec43d02c49dc525a4886d89314c16acacf6345a98726a4b57dff49f2bed88209' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:20 np0005593102 puppet-user[65661]: Warning: Scope(Apache::Vhost[manila_wsgi]): Jan 23 09:10:20 np0005593102 puppet-user[65661]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:20 np0005593102 puppet-user[65661]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:20 np0005593102 puppet-user[65661]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:20 np0005593102 puppet-user[65661]: file names. Jan 23 09:10:20 np0005593102 puppet-user[65661]: Jan 23 09:10:20 np0005593102 puppet-user[65661]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:20 np0005593102 puppet-user[65661]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:20 np0005593102 puppet-user[65661]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[/var/www/cgi-bin/keystone]/group: group changed 'root' to 'keystone' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[keystone_wsgi]/ensure: defined content as '{sha256}55e95baab868583f1b6646e2dcc61edb7f403991f97d4397478e9a9dd3e7d1f2' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_mellon.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_openidc.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_gssapi.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_mellon.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_openidc.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/Apache::Vhost[keystone_wsgi]/Concat[10-keystone_wsgi.conf]/File[/etc/httpd/conf.d/10-keystone_wsgi.conf]/ensure: defined content as '{sha256}dd58434eb90cf345ea38f687e3e1e35e8681769221c4d4d8b6b1b76ef7455642' Jan 23 09:10:20 np0005593102 puppet-user[65317]: Notice: Applied catalog in 1.11 seconds Jan 23 09:10:20 np0005593102 puppet-user[65317]: Application: Jan 23 09:10:20 np0005593102 puppet-user[65317]: Initial environment: production Jan 23 09:10:20 np0005593102 puppet-user[65317]: Converged environment: production Jan 23 09:10:20 np0005593102 puppet-user[65317]: Run mode: user Jan 23 09:10:20 np0005593102 puppet-user[65317]: Changes: Jan 23 09:10:20 np0005593102 puppet-user[65317]: Total: 88 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Events: Jan 23 09:10:20 np0005593102 puppet-user[65317]: Success: 88 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Total: 88 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Resources: Jan 23 09:10:20 np0005593102 puppet-user[65317]: Skipped: 31 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Changed: 88 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Out of sync: 88 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Total: 279 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Time: Jan 23 09:10:20 np0005593102 puppet-user[65317]: Concat file: 0.00 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Concat fragment: 0.00 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Cron: 0.01 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Augeas: 0.02 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Package: 0.02 Jan 23 09:10:20 np0005593102 puppet-user[65317]: File: 0.14 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Keystone config: 0.67 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Transaction evaluation: 1.09 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Catalog application: 1.11 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Config retrieval: 1.42 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Last run: 1769159420 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Resources: 0.00 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Total: 1.11 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Version: Jan 23 09:10:20 np0005593102 puppet-user[65317]: Config: 1769159417 Jan 23 09:10:20 np0005593102 puppet-user[65317]: Puppet: 7.10.0 Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.47 seconds Jan 23 09:10:20 np0005593102 puppet-user[66141]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:20 np0005593102 puppet-user[66141]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:20 np0005593102 puppet-user[66141]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:20 np0005593102 puppet-user[66141]: (file & line not available) Jan 23 09:10:20 np0005593102 puppet-user[66141]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:20 np0005593102 puppet-user[66141]: (file & line not available) Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: Accepting previously invalid value for target type 'Integer' Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.11 seconds Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/api_paste_config]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/owner: owner changed 'qdrouterd' to 'root' Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/group: group changed 'qdrouterd' to 'root' Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/mode: mode changed '0700' to '0755' Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: /Stage[main]/Qdr::Config/File[/etc/qpid-dispatch/ssl]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/storage_availability_zone]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: /Stage[main]/Qdr::Config/File[qdrouterd.conf]/content: content changed '{sha256}89e10d8896247f992c5f0baf027c25a8ca5d0441be46d8859d9db2067ea74cd3' to '{sha256}9021e52ce12d4f06c3ae16ea45e190ff7acf7e6ab0ca3a4d92ee0a71feda1b0d' Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd/metrics_qdr.log]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/rootwrap_config]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[66141]: Notice: Applied catalog in 0.03 seconds Jan 23 09:10:20 np0005593102 puppet-user[66141]: Application: Jan 23 09:10:20 np0005593102 puppet-user[66141]: Initial environment: production Jan 23 09:10:20 np0005593102 puppet-user[66141]: Converged environment: production Jan 23 09:10:20 np0005593102 puppet-user[66141]: Run mode: user Jan 23 09:10:20 np0005593102 puppet-user[66141]: Changes: Jan 23 09:10:20 np0005593102 puppet-user[66141]: Total: 7 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Events: Jan 23 09:10:20 np0005593102 puppet-user[66141]: Success: 7 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Total: 7 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Resources: Jan 23 09:10:20 np0005593102 puppet-user[66141]: Skipped: 13 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Changed: 5 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Out of sync: 5 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Total: 20 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Time: Jan 23 09:10:20 np0005593102 puppet-user[66141]: File: 0.01 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Transaction evaluation: 0.02 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Catalog application: 0.03 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Config retrieval: 0.14 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Last run: 1769159420 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Total: 0.03 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Version: Jan 23 09:10:20 np0005593102 puppet-user[66141]: Config: 1769159420 Jan 23 09:10:20 np0005593102 puppet-user[66141]: Puppet: 7.10.0 Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/state_path]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/host]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_listen]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/enabled_share_protocols]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/default_share_type]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_workers]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/auth_strategy]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Cron::Db_purge/Cron[manila-manage db purge]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_url]/ensure: created Jan 23 09:10:20 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_type]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/region_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/username]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/user_domain_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/password]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_domain_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_api_class]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_url]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_type]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/region_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/username]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/user_domain_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/password]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_domain_name]/ensure: created Jan 23 09:10:21 np0005593102 systemd[1]: libpod-dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e.scope: Deactivated successfully. Jan 23 09:10:21 np0005593102 systemd[1]: libpod-dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e.scope: Consumed 2.047s CPU time. Jan 23 09:10:21 np0005593102 podman[66041]: 2026-01-23 09:10:21.149154797 +0000 UTC m=+2.361608619 container died dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, build-date=2025-11-18T22:49:46Z, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, name=rhosp17/openstack-qdrouterd, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., managed_by=tripleo_ansible, url=https://www.redhat.com, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, container_name=container-puppet-metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, version=17.1.12, io.openshift.expose-services=, io.buildah.version=1.41.4, vcs-type=git) Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv4_enabled]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv6_enabled]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Backends/Manila_config[DEFAULT/enabled_share_backends]/ensure: created Jan 23 09:10:21 np0005593102 systemd[1]: libpod-eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4.scope: Deactivated successfully. Jan 23 09:10:21 np0005593102 systemd[1]: libpod-eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4.scope: Consumed 4.770s CPU time. Jan 23 09:10:21 np0005593102 podman[65288]: 2026-01-23 09:10:21.177984515 +0000 UTC m=+5.157870194 container died eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, batch=17.1_20251118.1, com.redhat.component=openstack-keystone-container, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, name=rhosp17/openstack-keystone, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, summary=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, config_id=tripleo_puppet_step1, container_name=container-puppet-keystone, url=https://www.redhat.com, architecture=x86_64, version=17.1.12, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T23:45:30Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4) Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/connection]/ensure: created Jan 23 09:10:21 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:21 np0005593102 systemd[1]: var-lib-containers-storage-overlay-c278e4ebde8e18f4a95b15b10f71a1455926ce3f1c92b862858bd9ab7833f482-merged.mount: Deactivated successfully. Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/max_retries]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[66340]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Jan 23 09:10:21 np0005593102 ovs-vsctl[66688]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:21 np0005593102 podman[66651]: 2026-01-23 09:10:21.271104051 +0000 UTC m=+0.098676526 container cleanup dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-qdrouterd-container, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, container_name=container-puppet-metrics_qdr, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, url=https://www.redhat.com, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, version=17.1.12, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, build-date=2025-11-18T22:49:46Z, architecture=x86_64, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1) Jan 23 09:10:21 np0005593102 systemd[1]: libpod-conmon-dde931477b6d18efc245825b8e1a2382dc5b4e995e6e95710eb114502c2ad31e.scope: Deactivated successfully. Jan 23 09:10:21 np0005593102 podman[66661]: 2026-01-23 09:10:21.278194167 +0000 UTC m=+0.091063495 container cleanup eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.4, architecture=x86_64, build-date=2025-11-18T23:45:30Z, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, name=rhosp17/openstack-keystone, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-keystone-container, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, container_name=container-puppet-keystone, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, tcib_managed=true, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Jan 23 09:10:21 np0005593102 systemd[1]: libpod-conmon-eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4.scope: Deactivated successfully. Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/db_max_retries]/ensure: created Jan 23 09:10:21 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-keystone --conmon-pidfile /run/container-puppet-keystone.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config --env NAME=keystone --env STEP_CONFIG=include ::tripleo::packages#012['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::keystone#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-keystone --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-keystone.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Rabbit[manila_config]/Manila_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:21 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-metrics_qdr --conmon-pidfile /run/container-puppet-metrics_qdr.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=metrics_qdr --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::qdr#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-metrics_qdr --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-metrics_qdr.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:10:21 np0005593102 puppet-user[66340]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:21 np0005593102 puppet-user[66340]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:21 np0005593102 puppet-user[66340]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:21 np0005593102 puppet-user[66340]: (file & line not available) Jan 23 09:10:21 np0005593102 puppet-user[66340]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:21 np0005593102 puppet-user[66340]: (file & line not available) Jan 23 09:10:21 np0005593102 puppet-user[66340]: Warning: Unknown variable: 'dhcp_agents_per_net'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/neutron.pp, line: 154, column: 37) Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/server_request_prefix]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/broadcast_prefix]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/group_request_prefix]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/container_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/idle_timeout]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/trace]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/control_exchange]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila/Oslo::Concurrency[manila_config]/Manila_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/debug]/ensure: created Jan 23 09:10:21 np0005593102 podman[66840]: 2026-01-23 09:10:21.682766299 +0000 UTC m=+0.058665158 container create 68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp17/openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, com.redhat.component=openstack-nova-api-container, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, container_name=container-puppet-nova_metadata, build-date=2025-11-19T00:34:57Z, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-type=git) Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:21 np0005593102 systemd[1]: Started libpod-conmon-68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001.scope. Jan 23 09:10:21 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:21 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/17638a7cb6187f13073b1c1964508e4a29d9167e4382ac3d881fa6aeec5d7bed/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:21 np0005593102 podman[66840]: 2026-01-23 09:10:21.73236279 +0000 UTC m=+0.108261669 container init 68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, version=17.1.12, release=1761123044, com.redhat.component=openstack-nova-api-container, container_name=container-puppet-nova_metadata, name=rhosp17/openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, managed_by=tripleo_ansible, build-date=2025-11-19T00:34:57Z, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., distribution-scope=public, tcib_managed=true, batch=17.1_20251118.1) Jan 23 09:10:21 np0005593102 podman[66840]: 2026-01-23 09:10:21.747402447 +0000 UTC m=+0.123301356 container start 68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-nova_metadata, managed_by=tripleo_ansible, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.openshift.expose-services=, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, url=https://www.redhat.com, build-date=2025-11-19T00:34:57Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-nova-api, release=1761123044, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, com.redhat.component=openstack-nova-api-container, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git) Jan 23 09:10:21 np0005593102 podman[66840]: 2026-01-23 09:10:21.648550137 +0000 UTC m=+0.024449046 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 09:10:21 np0005593102 podman[66840]: 2026-01-23 09:10:21.748327886 +0000 UTC m=+0.124226795 container attach 68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, name=rhosp17/openstack-nova-api, release=1761123044, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.4, com.redhat.component=openstack-nova-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, version=17.1.12, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, build-date=2025-11-19T00:34:57Z, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, container_name=container-puppet-nova_metadata) Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:21 np0005593102 podman[66869]: 2026-01-23 09:10:21.781443144 +0000 UTC m=+0.073602122 container create d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, name=rhosp17/openstack-cron, container_name=container-puppet-crond, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, url=https://www.redhat.com, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, com.redhat.component=openstack-cron-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 cron, build-date=2025-11-18T22:49:32Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, io.openshift.expose-services=, vendor=Red Hat, Inc., batch=17.1_20251118.1, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, release=1761123044) Jan 23 09:10:21 np0005593102 systemd[1]: Started libpod-conmon-d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a.scope. Jan 23 09:10:21 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:21 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/941b6efe97496868a9beb7910c3b8921d5b690643342fa7fe4309876c0522cc9/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:21 np0005593102 podman[66869]: 2026-01-23 09:10:21.819578446 +0000 UTC m=+0.111737424 container init d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, vcs-type=git, tcib_managed=true, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, release=1761123044, container_name=container-puppet-crond, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, build-date=2025-11-18T22:49:32Z, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cron, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-cron, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-cron-container, url=https://www.redhat.com, config_id=tripleo_puppet_step1, version=17.1.12) Jan 23 09:10:21 np0005593102 podman[66869]: 2026-01-23 09:10:21.830003374 +0000 UTC m=+0.122162352 container start d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, description=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, container_name=container-puppet-crond, io.openshift.expose-services=, com.redhat.component=openstack-cron-container, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, vendor=Red Hat, Inc., io.buildah.version=1.41.4, url=https://www.redhat.com, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-cron, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T22:49:32Z, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:21 np0005593102 podman[66869]: 2026-01-23 09:10:21.830315113 +0000 UTC m=+0.122474081 container attach d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.buildah.version=1.41.4, com.redhat.component=openstack-cron-container, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20251118.1, release=1761123044, version=17.1.12, managed_by=tripleo_ansible, architecture=x86_64, tcib_managed=true, container_name=container-puppet-crond, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:32Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, io.openshift.expose-services=, distribution-scope=public, name=rhosp17/openstack-cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:21 np0005593102 podman[66869]: 2026-01-23 09:10:21.741440716 +0000 UTC m=+0.033599694 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:21 np0005593102 ovs-vsctl[66934]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}a988b3b14e2767d5013472e9aadecfeaacadeab861a10a4790ad73b31f5b2049' Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:21 np0005593102 systemd[1]: var-lib-containers-storage-overlay-b3b750d641d7165b654d65aa8185041eab91e423bc5fc830bee91c041ac9d62c-merged.mount: Deactivated successfully. Jan 23 09:10:21 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-eea32cc6a6a341fff207a9f8849621f5644087b1693d7413db9e4eec01f3fcd4-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:21 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Policy/Oslo::Policy[manila_config]/Manila_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Api/Oslo::Middleware[manila_config]/Manila_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[/var/www/cgi-bin/manila]/group: group changed 'root' to 'manila' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[manila_wsgi]/ensure: defined content as '{sha256}ca07199ace8325d094e754ccdfefb2b5a78a13cd657d68221b3a68b53b0dd893' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/driver_handles_share_servers]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_backend_name]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_driver]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_conf_path]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_auth_id]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_cluster_name]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[66511]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:22 np0005593102 puppet-user[66511]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:22 np0005593102 puppet-user[66511]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:22 np0005593102 puppet-user[66511]: (file & line not available) Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_ip]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_is_remote]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_volume_mode]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_protocol_helper_type]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:22 np0005593102 puppet-user[66511]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:22 np0005593102 puppet-user[66511]: (file & line not available) Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/Apache::Vhost[manila_wsgi]/Concat[10-manila_wsgi.conf]/File[/etc/httpd/conf.d/10-manila_wsgi.conf]/ensure: defined content as '{sha256}d8cae99db5524bbf16ba2c5eaa945348421175f1f65269f0fcfab86d2f7604a9' Jan 23 09:10:22 np0005593102 puppet-user[65661]: Notice: Applied catalog in 1.60 seconds Jan 23 09:10:22 np0005593102 puppet-user[65661]: Application: Jan 23 09:10:22 np0005593102 puppet-user[65661]: Initial environment: production Jan 23 09:10:22 np0005593102 puppet-user[65661]: Converged environment: production Jan 23 09:10:22 np0005593102 puppet-user[65661]: Run mode: user Jan 23 09:10:22 np0005593102 puppet-user[65661]: Changes: Jan 23 09:10:22 np0005593102 puppet-user[65661]: Total: 115 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Events: Jan 23 09:10:22 np0005593102 puppet-user[65661]: Success: 115 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Total: 115 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Resources: Jan 23 09:10:22 np0005593102 puppet-user[65661]: Changed: 115 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Out of sync: 115 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Skipped: 47 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Total: 330 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Time: Jan 23 09:10:22 np0005593102 puppet-user[65661]: Resources: 0.00 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Concat file: 0.00 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Concat fragment: 0.00 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Augeas: 0.02 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Package: 0.02 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Cron: 0.04 Jan 23 09:10:22 np0005593102 puppet-user[65661]: File: 0.11 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Manila config: 1.16 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Transaction evaluation: 1.59 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Catalog application: 1.60 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Config retrieval: 1.63 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Last run: 1769159422 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Total: 1.60 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Version: Jan 23 09:10:22 np0005593102 puppet-user[65661]: Config: 1769159419 Jan 23 09:10:22 np0005593102 puppet-user[65661]: Puppet: 7.10.0 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:22 np0005593102 puppet-user[66487]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:22 np0005593102 puppet-user[66487]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:22 np0005593102 puppet-user[66487]: (file & line not available) Jan 23 09:10:22 np0005593102 puppet-user[66487]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:22 np0005593102 puppet-user[66487]: (file & line not available) Jan 23 09:10:22 np0005593102 puppet-user[66511]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Jan 23 09:10:22 np0005593102 puppet-user[66511]: in a future release. Use nova::cinder::os_region_name instead Jan 23 09:10:22 np0005593102 puppet-user[66511]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Jan 23 09:10:22 np0005593102 puppet-user[66511]: in a future release. Use nova::cinder::catalog_info instead Jan 23 09:10:22 np0005593102 puppet-user[66511]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:22 np0005593102 puppet-user[66511]: removed in a future realse. Use nova::db::database_connection instead Jan 23 09:10:22 np0005593102 puppet-user[66511]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Jan 23 09:10:22 np0005593102 puppet-user[66511]: removed in a future realse. Use nova::db::api_database_connection instead Jan 23 09:10:22 np0005593102 puppet-user[66511]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Jan 23 09:10:22 np0005593102 puppet-user[66487]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.33 seconds Jan 23 09:10:22 np0005593102 puppet-user[66487]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/root/.my.cnf]/ensure: defined content as '{sha256}ab7ac237761d7e85dafbf4f0aa46c359eec1ec3cc1f030b535c5c2333da75d88' Jan 23 09:10:22 np0005593102 puppet-user[66487]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}652447b18c6612302e29c44741c052299a6b2fefbb8c1076666ac91a56a935bb' Jan 23 09:10:22 np0005593102 puppet-user[66487]: Notice: /Stage[main]/Mysql::Server::Config/File[mysql-config-file]/content: content changed '{sha256}df7b18b99470a82afb1aebff284d910b04ceb628c9ac89d8e2fe9fb4682d5fc9' to '{sha256}ca39f065f5c2ec92c2bc67c791c07fa65bcb14ea4cf916975bf5822b03b57030' Jan 23 09:10:22 np0005593102 puppet-user[66487]: Notice: /Stage[main]/Mysql::Server::Installdb/File[/var/log/mariadb/mariadb.log]/ensure: created Jan 23 09:10:22 np0005593102 puppet-user[66487]: Notice: Applied catalog in 0.07 seconds Jan 23 09:10:22 np0005593102 puppet-user[66487]: Application: Jan 23 09:10:22 np0005593102 puppet-user[66487]: Initial environment: production Jan 23 09:10:22 np0005593102 puppet-user[66487]: Converged environment: production Jan 23 09:10:22 np0005593102 puppet-user[66487]: Run mode: user Jan 23 09:10:22 np0005593102 puppet-user[66487]: Changes: Jan 23 09:10:22 np0005593102 puppet-user[66487]: Total: 4 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Events: Jan 23 09:10:22 np0005593102 puppet-user[66487]: Success: 4 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Total: 4 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Resources: Jan 23 09:10:22 np0005593102 puppet-user[66487]: Skipped: 13 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Changed: 4 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Out of sync: 4 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Total: 18 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Time: Jan 23 09:10:22 np0005593102 puppet-user[66487]: File: 0.02 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Transaction evaluation: 0.06 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Catalog application: 0.07 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Config retrieval: 0.37 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Last run: 1769159422 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Total: 0.07 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Version: Jan 23 09:10:22 np0005593102 puppet-user[66487]: Config: 1769159422 Jan 23 09:10:22 np0005593102 puppet-user[66487]: Puppet: 7.10.0 Jan 23 09:10:22 np0005593102 systemd[1]: libpod-e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417.scope: Deactivated successfully. Jan 23 09:10:22 np0005593102 systemd[1]: libpod-e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417.scope: Consumed 5.310s CPU time. Jan 23 09:10:22 np0005593102 podman[65609]: 2026-01-23 09:10:22.788236759 +0000 UTC m=+5.728786923 container died e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, summary=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-manila-api-container, version=17.1.12, name=rhosp17/openstack-manila-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vcs-type=git, io.buildah.version=1.41.4, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, build-date=2025-11-19T00:21:10Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.openshift.expose-services=, container_name=container-puppet-manila, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:22 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:22 np0005593102 systemd[1]: var-lib-containers-storage-overlay-d9aa1f0ac2d3125a0164d9887496e2d14680b060a51b849edc4c4b1faef57d53-merged.mount: Deactivated successfully. Jan 23 09:10:22 np0005593102 puppet-user[66340]: Warning: Scope(Apache::Vhost[neutron-api-proxy]): Jan 23 09:10:22 np0005593102 puppet-user[66340]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:22 np0005593102 puppet-user[66340]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:22 np0005593102 puppet-user[66340]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:22 np0005593102 puppet-user[66340]: file names. Jan 23 09:10:22 np0005593102 puppet-user[66340]: Jan 23 09:10:22 np0005593102 puppet-user[66340]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:22 np0005593102 puppet-user[66340]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:22 np0005593102 puppet-user[66340]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:22 np0005593102 podman[67088]: 2026-01-23 09:10:22.948539681 +0000 UTC m=+0.151474425 container cleanup e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, container_name=container-puppet-manila, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-19T00:21:10Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, config_id=tripleo_puppet_step1, version=17.1.12, batch=17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.component=openstack-manila-api-container, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.4, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, tcib_managed=true, architecture=x86_64, io.openshift.expose-services=, vcs-type=git, name=rhosp17/openstack-manila-api) Jan 23 09:10:22 np0005593102 systemd[1]: libpod-conmon-e8862e4e18235ffca7887f04f05ef412100e671cae8318294549121ca43f3417.scope: Deactivated successfully. Jan 23 09:10:22 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-manila --conmon-pidfile /run/container-puppet-manila.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line --env NAME=manila --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::manila::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::manila::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::manila::share_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-manila --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-manila.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Jan 23 09:10:23 np0005593102 systemd[1]: libpod-4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559.scope: Deactivated successfully. Jan 23 09:10:23 np0005593102 systemd[1]: libpod-4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559.scope: Consumed 2.885s CPU time. Jan 23 09:10:23 np0005593102 podman[66424]: 2026-01-23 09:10:23.006331641 +0000 UTC m=+3.146817784 container died 4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, name=rhosp17/openstack-mariadb, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-mysql, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vendor=Red Hat, Inc., tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, config_id=tripleo_puppet_step1, release=1761123044, summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4) Jan 23 09:10:23 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:23 np0005593102 systemd[1]: var-lib-containers-storage-overlay-cc809a0eb0f645c72c0c634dcbd1f8878b83ecf8edd3c8f88378e136eaf98539-merged.mount: Deactivated successfully. Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.71 seconds Jan 23 09:10:23 np0005593102 podman[67150]: 2026-01-23 09:10:23.097189668 +0000 UTC m=+0.080485803 container cleanup 4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, vcs-type=git, description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-mariadb-container, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, architecture=x86_64, managed_by=tripleo_ansible, name=rhosp17/openstack-mariadb, vendor=Red Hat, Inc., build-date=2025-11-18T22:51:13Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-mysql) Jan 23 09:10:23 np0005593102 systemd[1]: libpod-conmon-4c3380b5a9ae9e0877d49941f0ea4870b7086896d0964ed05bbd9a4e710ed559.scope: Deactivated successfully. Jan 23 09:10:23 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-mysql --conmon-pidfile /run/container-puppet-mysql.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=mysql --env STEP_CONFIG=include ::tripleo::packages#012['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }#012exec {'wait-for-settle': command => '/bin/true' }#012include tripleo::profile::pacemaker::database::mysql_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-mysql --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-mysql.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:23 np0005593102 puppet-user[66511]: Warning: Unknown variable: '::nova::scheduler::filter::scheduler_max_attempts'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 122, column: 29) Jan 23 09:10:23 np0005593102 puppet-user[66511]: Warning: Unknown variable: '::nova::scheduler::filter::periodic_task_interval'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 123, column: 39) Jan 23 09:10:23 np0005593102 puppet-user[66511]: Warning: Scope(Class[Nova::Scheduler::Filter]): The nova::scheduler::filter::scheduler_max_attempts parameter has been deprecated and \ Jan 23 09:10:23 np0005593102 puppet-user[66511]: will be removed in a future release. Use the nova::scheduler::max_attempts parameter instead. Jan 23 09:10:23 np0005593102 sshd[67250]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/bind_host]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/auth_strategy]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/core_plugin]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/host]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dns_domain]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dhcp_agent_notification]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/allow_overlapping_ips]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/global_physnet_mtu]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/vlan_transparent]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[agent/root_helper]/ensure: created Jan 23 09:10:23 np0005593102 podman[67255]: 2026-01-23 09:10:23.445429074 +0000 UTC m=+0.099303205 container create a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., tcib_managed=true, vcs-type=git, version=17.1.12, com.redhat.component=openstack-ovn-controller-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, io.openshift.expose-services=, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, build-date=2025-11-18T23:34:05Z, name=rhosp17/openstack-ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com, container_name=container-puppet-ovn_controller, architecture=x86_64) Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[agent/report_interval]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/service_plugins]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_url]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/username]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/password]/ensure: created Jan 23 09:10:23 np0005593102 systemd[1]: Started libpod-conmon-a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4.scope. Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_domain_name]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_name]/ensure: created Jan 23 09:10:23 np0005593102 podman[67273]: 2026-01-23 09:10:23.493456958 +0000 UTC m=+0.094971594 container create d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, tcib_managed=true, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, distribution-scope=public, container_name=container-puppet-placement, summary=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20251118.1, release=1761123044, architecture=x86_64, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, com.redhat.component=openstack-placement-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T23:41:26Z, name=rhosp17/openstack-placement-api, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d) Jan 23 09:10:23 np0005593102 podman[67255]: 2026-01-23 09:10:23.39374442 +0000 UTC m=+0.047618521 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Jan 23 09:10:23 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/user_domain_name]/ensure: created Jan 23 09:10:23 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5000db2a0fa7528837b455fa141f7c3275fa123f6e0facd60da6b571b9859ce4/merged/etc/sysconfig/modules supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/region_name]/ensure: created Jan 23 09:10:23 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5000db2a0fa7528837b455fa141f7c3275fa123f6e0facd60da6b571b9859ce4/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/endpoint_type]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_type]/ensure: created Jan 23 09:10:23 np0005593102 podman[67255]: 2026-01-23 09:10:23.512461576 +0000 UTC m=+0.166335687 container init a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, io.buildah.version=1.41.4, tcib_managed=true, name=rhosp17/openstack-ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, managed_by=tripleo_ansible, build-date=2025-11-18T23:34:05Z, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-ovn_controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, distribution-scope=public, com.redhat.component=openstack-ovn-controller-container, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, release=1761123044, version=17.1.12) Jan 23 09:10:23 np0005593102 ovs-vsctl[67301]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:23 np0005593102 systemd[1]: Started libpod-conmon-d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7.scope. Jan 23 09:10:23 np0005593102 podman[67255]: 2026-01-23 09:10:23.520742598 +0000 UTC m=+0.174616699 container start a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-ovn-controller, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, io.openshift.expose-services=, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com, architecture=x86_64, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, build-date=2025-11-18T23:34:05Z, version=17.1.12, com.redhat.component=openstack-ovn-controller-container, vcs-type=git, io.buildah.version=1.41.4, container_name=container-puppet-ovn_controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_puppet_step1, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible) Jan 23 09:10:23 np0005593102 podman[67255]: 2026-01-23 09:10:23.521215742 +0000 UTC m=+0.175089853 container attach a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.component=openstack-ovn-controller-container, build-date=2025-11-18T23:34:05Z, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-ovn-controller, vcs-type=git, managed_by=tripleo_ansible, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, summary=Red Hat OpenStack Platform 17.1 ovn-controller, container_name=container-puppet-ovn_controller, version=17.1.12, vendor=Red Hat, Inc., vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, io.openshift.expose-services=, io.buildah.version=1.41.4) Jan 23 09:10:23 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_url]/ensure: created Jan 23 09:10:23 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/91026dad9d8c45b7d749379a4b1026100a064ffe5d735d4281f2ac30cf29a4bd/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/username]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/password]/ensure: created Jan 23 09:10:23 np0005593102 podman[67273]: 2026-01-23 09:10:23.5378775 +0000 UTC m=+0.139392136 container init d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_puppet_step1, vcs-type=git, vendor=Red Hat, Inc., release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, com.redhat.component=openstack-placement-api-container, build-date=2025-11-18T23:41:26Z, distribution-scope=public, url=https://www.redhat.com, container_name=container-puppet-placement, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.12, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-placement-api, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.buildah.version=1.41.4, io.openshift.expose-services=) Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_domain_name]/ensure: created Jan 23 09:10:23 np0005593102 podman[67273]: 2026-01-23 09:10:23.445868248 +0000 UTC m=+0.047382894 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Jan 23 09:10:23 np0005593102 podman[67273]: 2026-01-23 09:10:23.551263118 +0000 UTC m=+0.152777754 container start d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, com.redhat.component=openstack-placement-api-container, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T23:41:26Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, name=rhosp17/openstack-placement-api, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., managed_by=tripleo_ansible, url=https://www.redhat.com, container_name=container-puppet-placement, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 placement-api) Jan 23 09:10:23 np0005593102 podman[67273]: 2026-01-23 09:10:23.551494075 +0000 UTC m=+0.153008721 container attach d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, tcib_managed=true, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, config_id=tripleo_puppet_step1, name=rhosp17/openstack-placement-api, com.redhat.component=openstack-placement-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, container_name=container-puppet-placement, release=1761123044, distribution-scope=public, architecture=x86_64, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.12, build-date=2025-11-18T23:41:26Z, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_name]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/user_domain_name]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/region_name]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_type]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66925]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:23 np0005593102 puppet-user[66925]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:23 np0005593102 puppet-user[66925]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:23 np0005593102 puppet-user[66925]: (file & line not available) Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/l3_ha]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/max_l3_agents_per_router]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/api_workers]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/rpc_workers]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/agent_down_time]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66925]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:23 np0005593102 puppet-user[66925]: (file & line not available) Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/router_scheduler_driver]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/allow_automatic_l3agent_failover]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66511]: Warning: Scope(Apache::Vhost[nova_api_wsgi]): Jan 23 09:10:23 np0005593102 puppet-user[66511]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:23 np0005593102 puppet-user[66511]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:23 np0005593102 puppet-user[66511]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:23 np0005593102 puppet-user[66511]: file names. Jan 23 09:10:23 np0005593102 puppet-user[66511]: Jan 23 09:10:23 np0005593102 puppet-user[66511]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:23 np0005593102 puppet-user[66511]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:23 np0005593102 puppet-user[66511]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:23 np0005593102 puppet-user[66906]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:23 np0005593102 puppet-user[66906]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:23 np0005593102 puppet-user[66906]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:23 np0005593102 puppet-user[66906]: (file & line not available) Jan 23 09:10:23 np0005593102 puppet-user[66925]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.08 seconds Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server/Neutron_config[ovs/igmp_snooping_enable]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66906]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:23 np0005593102 puppet-user[66906]: (file & line not available) Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_port]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66925]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/File[/etc/logrotate-crond.conf]/ensure: defined content as '{sha256}1c3202f58bd2ae16cb31badcbb7f0d4e6697157b987d1887736ad96bb73d70b0' Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_security_group]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66925]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/Cron[logrotate-crond]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_network_gateway]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_packet_filter]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66925]: Notice: Applied catalog in 0.04 seconds Jan 23 09:10:23 np0005593102 puppet-user[66925]: Application: Jan 23 09:10:23 np0005593102 puppet-user[66925]: Initial environment: production Jan 23 09:10:23 np0005593102 puppet-user[66925]: Converged environment: production Jan 23 09:10:23 np0005593102 puppet-user[66925]: Run mode: user Jan 23 09:10:23 np0005593102 puppet-user[66925]: Changes: Jan 23 09:10:23 np0005593102 puppet-user[66925]: Total: 2 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Events: Jan 23 09:10:23 np0005593102 puppet-user[66925]: Success: 2 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Total: 2 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Resources: Jan 23 09:10:23 np0005593102 puppet-user[66925]: Changed: 2 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Out of sync: 2 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Skipped: 7 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Total: 9 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Time: Jan 23 09:10:23 np0005593102 puppet-user[66925]: File: 0.01 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Cron: 0.01 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Transaction evaluation: 0.03 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Catalog application: 0.04 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Config retrieval: 0.11 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Last run: 1769159423 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Total: 0.04 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Version: Jan 23 09:10:23 np0005593102 puppet-user[66925]: Config: 1769159423 Jan 23 09:10:23 np0005593102 puppet-user[66925]: Puppet: 7.10.0 Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/neutron/plugin.ini]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/default/neutron-server]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/type_drivers]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/tenant_network_types]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/mechanism_drivers]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/path_mtu]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/extension_drivers]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/overlay_ip_version]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/control_exchange]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Oslo::Concurrency[neutron_config]/Neutron_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66511]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.68 seconds Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66906]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Jan 23 09:10:23 np0005593102 puppet-user[66906]: in a future release. Use nova::cinder::os_region_name instead Jan 23 09:10:23 np0005593102 puppet-user[66906]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Jan 23 09:10:23 np0005593102 puppet-user[66906]: in a future release. Use nova::cinder::catalog_info instead Jan 23 09:10:23 np0005593102 puppet-user[66906]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:23 np0005593102 puppet-user[66906]: removed in a future realse. Use nova::db::database_connection instead Jan 23 09:10:23 np0005593102 puppet-user[66906]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Jan 23 09:10:23 np0005593102 puppet-user[66906]: removed in a future realse. Use nova::db::api_database_connection instead Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/debug]/ensure: created Jan 23 09:10:23 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66906]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:24 np0005593102 systemd[1]: libpod-d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a.scope: Deactivated successfully. Jan 23 09:10:24 np0005593102 systemd[1]: libpod-d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a.scope: Consumed 2.073s CPU time. Jan 23 09:10:24 np0005593102 podman[66869]: 2026-01-23 09:10:24.06614099 +0000 UTC m=+2.358299968 container died d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, version=17.1.12, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:32Z, release=1761123044, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cron, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, architecture=x86_64, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, container_name=container-puppet-crond, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, io.buildah.version=1.41.4, name=rhosp17/openstack-cron, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron) Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:24 np0005593102 systemd[1]: tmp-crun.Xnv6S6.mount: Deactivated successfully. Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:24 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}477db3ce6366cc4cb2547fcddeedb8215cbfaa5f194d7e8f5798309935ba604b' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:24 np0005593102 podman[67480]: 2026-01-23 09:10:24.176587013 +0000 UTC m=+0.101849783 container cleanup d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, batch=17.1_20251118.1, container_name=container-puppet-crond, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:32Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, vendor=Red Hat, Inc., release=1761123044, url=https://www.redhat.com, com.redhat.component=openstack-cron-container, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, tcib_managed=true, name=rhosp17/openstack-cron, description=Red Hat OpenStack Platform 17.1 cron, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, managed_by=tripleo_ansible, vcs-type=git, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public) Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:24 np0005593102 systemd[1]: libpod-conmon-d2bb6e4a14209adc9f49e7e7f1b2cd0b0185bf654f468ec6a8aab48439e6381a.scope: Deactivated successfully. Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:24 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-crond --conmon-pidfile /run/container-puppet-crond.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=crond --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::logrotate --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-crond --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-crond.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}89b63b4bc0f13f2c7bc7bfc4f831ca44bf14e24fd66dbc944c3a47e38416e274' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/connection]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/max_retries]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[nova_api_wsgi]/ensure: defined content as '{sha256}901cc9636a87a089b1b6620430d7a36909add0ca7dc2216b74d7bb9dc627d776' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/db_max_retries]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Policy/Oslo::Policy[neutron_config]/Neutron_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Server/Oslo::Middleware[neutron_config]/Neutron_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/max_header_size]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/vni_ranges]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vxlan_group]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vni_ranges]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vlan]/Neutron_plugin_ml2[ml2_type_vlan/network_vlan_ranges]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[flat]/Neutron_plugin_ml2[ml2_type_flat/flat_networks]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_connection]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_connection]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_private_key]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_certificate]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_ca_cert]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_private_key]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_certificate]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_ca_cert]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_connection_timeout]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_probe_interval]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/neutron_sync_mode]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_metadata_enabled]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/enable_distributed_floating_ip]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/dns_servers]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_emit_need_to_frag]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/rate_limit]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/burst_limit]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: /Stage[main]/Tripleo::Profile::Base::Neutron::Server/Tripleo::Tls_proxy[neutron-api]/Apache::Vhost[neutron-api-proxy]/Concat[25-neutron-api-proxy.conf]/File[/etc/httpd/conf.d/25-neutron-api-proxy.conf]/ensure: defined content as '{sha256}cf7e78c8a24e95ce00cf822a7af54c202e89873161a28c29d509d6d547b327db' Jan 23 09:10:24 np0005593102 podman[67553]: 2026-01-23 09:10:24.555196995 +0000 UTC m=+0.061087652 container create 03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=container-puppet-rabbitmq, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, name=rhosp17/openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:49:50Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, tcib_managed=true, release=1761123044, description=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:24 np0005593102 puppet-user[66340]: Notice: Applied catalog in 1.34 seconds Jan 23 09:10:24 np0005593102 puppet-user[66340]: Application: Jan 23 09:10:24 np0005593102 puppet-user[66340]: Initial environment: production Jan 23 09:10:24 np0005593102 puppet-user[66340]: Converged environment: production Jan 23 09:10:24 np0005593102 puppet-user[66340]: Run mode: user Jan 23 09:10:24 np0005593102 puppet-user[66340]: Changes: Jan 23 09:10:24 np0005593102 puppet-user[66340]: Total: 137 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Events: Jan 23 09:10:24 np0005593102 puppet-user[66340]: Success: 137 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Total: 137 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Resources: Jan 23 09:10:24 np0005593102 puppet-user[66340]: Changed: 137 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Out of sync: 137 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Skipped: 41 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Total: 384 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Time: Jan 23 09:10:24 np0005593102 puppet-user[66340]: Resources: 0.00 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Concat file: 0.00 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Concat fragment: 0.00 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Augeas: 0.02 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Package: 0.02 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Neutron plugin ml2: 0.09 Jan 23 09:10:24 np0005593102 puppet-user[66340]: File: 0.13 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Neutron config: 0.82 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Transaction evaluation: 1.32 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Catalog application: 1.34 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Config retrieval: 1.87 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Last run: 1769159424 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Total: 1.34 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Version: Jan 23 09:10:24 np0005593102 puppet-user[66340]: Config: 1769159421 Jan 23 09:10:24 np0005593102 puppet-user[66340]: Puppet: 7.10.0 Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Jan 23 09:10:24 np0005593102 systemd[1]: Started libpod-conmon-03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade.scope. Jan 23 09:10:24 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:24 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b6f8da410f418056bb69ecd59496cc38b7211f744260a02e97442bfa3061ff5b/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:24 np0005593102 podman[67553]: 2026-01-23 09:10:24.605643042 +0000 UTC m=+0.111533699 container init 03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, com.redhat.component=openstack-rabbitmq-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, vcs-type=git, container_name=container-puppet-rabbitmq, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 rabbitmq, release=1761123044, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, io.buildah.version=1.41.4, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp17/openstack-rabbitmq, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T22:49:50Z, vendor=Red Hat, Inc., batch=17.1_20251118.1, distribution-scope=public, config_id=tripleo_puppet_step1) Jan 23 09:10:24 np0005593102 podman[67553]: 2026-01-23 09:10:24.611778278 +0000 UTC m=+0.117668975 container start 03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, container_name=container-puppet-rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, build-date=2025-11-18T22:49:50Z, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, release=1761123044, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp17/openstack-rabbitmq, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, vendor=Red Hat, Inc., managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, tcib_managed=true, com.redhat.component=openstack-rabbitmq-container, distribution-scope=public, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, version=17.1.12) Jan 23 09:10:24 np0005593102 podman[67553]: 2026-01-23 09:10:24.612022706 +0000 UTC m=+0.117913363 container attach 03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, io.openshift.expose-services=, container_name=container-puppet-rabbitmq, name=rhosp17/openstack-rabbitmq, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, architecture=x86_64, build-date=2025-11-18T22:49:50Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, description=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., com.redhat.component=openstack-rabbitmq-container, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, config_id=tripleo_puppet_step1, distribution-scope=public, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 rabbitmq) Jan 23 09:10:24 np0005593102 podman[67553]: 2026-01-23 09:10:24.527157801 +0000 UTC m=+0.033048478 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/instance_name_template]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/enabled_apis]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Nova_config[wsgi/api_paste_config]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66906]: Warning: Scope(Apache::Vhost[nova_metadata_wsgi]): Jan 23 09:10:24 np0005593102 puppet-user[66906]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:24 np0005593102 puppet-user[66906]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:24 np0005593102 puppet-user[66906]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:24 np0005593102 puppet-user[66906]: file names. Jan 23 09:10:24 np0005593102 puppet-user[66906]: Jan 23 09:10:24 np0005593102 puppet-user[66906]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:24 np0005593102 puppet-user[66906]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:24 np0005593102 puppet-user[66906]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen_port]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_workers]/ensure: created Jan 23 09:10:24 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Nova_config[api/use_forwarded_for]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Nova_config[api/max_limit]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/allow_resize_to_same_host]/ensure: created Jan 23 09:10:25 np0005593102 systemd[1]: var-lib-containers-storage-overlay-941b6efe97496868a9beb7910c3b8921d5b690643342fa7fe4309876c0522cc9-merged.mount: Deactivated successfully. Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.41 seconds Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[67346]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:25 np0005593102 puppet-user[67346]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:25 np0005593102 puppet-user[67346]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:25 np0005593102 puppet-user[67346]: (file & line not available) Jan 23 09:10:25 np0005593102 puppet-user[67346]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:25 np0005593102 puppet-user[67346]: (file & line not available) Jan 23 09:10:25 np0005593102 puppet-user[67370]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:25 np0005593102 puppet-user[67370]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:25 np0005593102 puppet-user[67370]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:25 np0005593102 puppet-user[67370]: (file & line not available) Jan 23 09:10:25 np0005593102 puppet-user[67370]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:25 np0005593102 puppet-user[67370]: (file & line not available) Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:25 np0005593102 systemd[1]: libpod-32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb.scope: Deactivated successfully. Jan 23 09:10:25 np0005593102 systemd[1]: libpod-32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb.scope: Consumed 5.651s CPU time. Jan 23 09:10:25 np0005593102 podman[66287]: 2026-01-23 09:10:25.475408442 +0000 UTC m=+6.095352308 container died 32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, build-date=2025-11-19T00:23:27Z, architecture=x86_64, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, url=https://www.redhat.com, com.redhat.component=openstack-neutron-server-container, vendor=Red Hat, Inc., name=rhosp17/openstack-neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, container_name=container-puppet-neutron, version=17.1.12, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, managed_by=tripleo_ansible) Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}ef345fb5fb978c14d3aa0a30dd0e5dff9b266e9ba48a519b676f1a051b0cd526' Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:25 np0005593102 systemd[1]: tmp-crun.RAFBhv.mount: Deactivated successfully. Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:25 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.21 seconds Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Conductor/Nova_config[conductor/workers]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/workers]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:25 np0005593102 podman[67748]: 2026-01-23 09:10:25.597958024 +0000 UTC m=+0.112902469 container cleanup 32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, build-date=2025-11-19T00:23:27Z, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, container_name=container-puppet-neutron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.openshift.expose-services=, tcib_managed=true, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, name=rhosp17/openstack-neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, version=17.1.12, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., com.redhat.component=openstack-neutron-server-container, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c) Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:25 np0005593102 systemd[1]: libpod-conmon-32ac427b3418eb269c06d275e1b4018826316e6a6929afdab26f0349689658bb.scope: Deactivated successfully. Jan 23 09:10:25 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-neutron --conmon-pidfile /run/container-puppet-neutron.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2 --env NAME=neutron --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::server#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::neutron::plugins::ml2#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-neutron --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-neutron.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/discover_hosts_in_cells_interval]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_image_type_support]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:25 np0005593102 ovs-vsctl[67774]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:172.17.0.103:6642,ssl:172.17.0.104:6642,ssl:172.17.0.105:6642 Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/limit_tenants_to_placement_aggregate]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/placement_aggregate_required_for_tenants]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:25 np0005593102 ovs-vsctl[67780]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-type]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/enable_isolated_aggregate_filtering]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_availability_zone]/ensure: created Jan 23 09:10:25 np0005593102 ovs-vsctl[67789]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=172.19.0.104 Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_routed_network_aggregates]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/host_subset_size]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-ip]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Jan 23 09:10:25 np0005593102 ovs-vsctl[67799]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005593102.ooo.test Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:hostname]/value: value changed 'np0005593102.novalocal' to 'np0005593102.ooo.test' Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/weight_classes]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Jan 23 09:10:25 np0005593102 ovs-vsctl[67807]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Jan 23 09:10:25 np0005593102 ovs-vsctl[67814]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote-probe-interval]/ensure: created Jan 23 09:10:25 np0005593102 ovs-vsctl[67822]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-openflow-probe-interval]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/shuffle_best_same_weighed_hosts]/ensure: created Jan 23 09:10:25 np0005593102 ovs-vsctl[67828]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=true Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-monitor-all]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Jan 23 09:10:25 np0005593102 ovs-vsctl[67840]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_ca_certs]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_cert]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-ofctrl-wait-before-clear]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_key]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_host]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_port]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/auth_schemes]/ensure: created Jan 23 09:10:25 np0005593102 ovs-vsctl[67854]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-tos=0 Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-tos]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Jan 23 09:10:25 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Jan 23 09:10:25 np0005593102 podman[67842]: 2026-01-23 09:10:25.952069909 +0000 UTC m=+0.080528624 container create 7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, container_name=container-puppet-redis, io.openshift.expose-services=, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 redis, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-redis, vcs-type=git, tcib_managed=true, maintainer=OpenStack TripleO Team, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 redis, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, managed_by=tripleo_ansible, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:25 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:25 np0005593102 ovs-vsctl[67856]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-chassis-mac-mappings=datacentre:fa:16:3e:25:98:d6 Jan 23 09:10:25 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-chassis-mac-mappings]/ensure: created Jan 23 09:10:25 np0005593102 systemd[1]: Started libpod-conmon-7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f.scope. Jan 23 09:10:25 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:25 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/efe17248a83a482bfe43ad758d53ffe51faf8812da8d416ff55255e820dd0a58/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:25 np0005593102 ovs-vsctl[67860]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=datacentre:br-ex Jan 23 09:10:26 np0005593102 podman[67842]: 2026-01-23 09:10:26.004382383 +0000 UTC m=+0.132841098 container init 7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, distribution-scope=public, build-date=2025-11-18T22:49:49Z, description=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, managed_by=tripleo_ansible, io.openshift.expose-services=, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-redis, tcib_managed=true, container_name=container-puppet-redis, io.buildah.version=1.41.4, version=17.1.12, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:26 np0005593102 podman[67842]: 2026-01-23 09:10:25.911437912 +0000 UTC m=+0.039896697 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge-mappings]/ensure: created Jan 23 09:10:26 np0005593102 podman[67842]: 2026-01-23 09:10:26.014369846 +0000 UTC m=+0.142828571 container start 7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, build-date=2025-11-18T22:49:49Z, maintainer=OpenStack TripleO Team, release=1761123044, container_name=container-puppet-redis, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, url=https://www.redhat.com, distribution-scope=public, vcs-type=git, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, name=rhosp17/openstack-redis, summary=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.component=openstack-redis-container, description=Red Hat OpenStack Platform 17.1 redis, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:26 np0005593102 podman[67842]: 2026-01-23 09:10:26.014518692 +0000 UTC m=+0.142977407 container attach 7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, managed_by=tripleo_ansible, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, com.redhat.component=openstack-redis-container, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., url=https://www.redhat.com, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-redis, tcib_managed=true, name=rhosp17/openstack-redis, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, build-date=2025-11-18T22:49:49Z, summary=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, architecture=x86_64, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis) Jan 23 09:10:26 np0005593102 ovs-vsctl[67873]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Jan 23 09:10:26 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-match-northd-version]/ensure: created Jan 23 09:10:26 np0005593102 ovs-vsctl[67881]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:garp-max-timeout-sec=0 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:garp-max-timeout-sec]/ensure: created Jan 23 09:10:26 np0005593102 systemd[1]: var-lib-containers-storage-overlay-652934ae958b526b6e13c168dae216de22c5effdd2d9863438e808c872f7dfd3-merged.mount: Deactivated successfully. Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67346]: Notice: Applied catalog in 0.53 seconds Jan 23 09:10:26 np0005593102 puppet-user[67346]: Application: Jan 23 09:10:26 np0005593102 puppet-user[67346]: Initial environment: production Jan 23 09:10:26 np0005593102 puppet-user[67346]: Converged environment: production Jan 23 09:10:26 np0005593102 puppet-user[67346]: Run mode: user Jan 23 09:10:26 np0005593102 puppet-user[67346]: Changes: Jan 23 09:10:26 np0005593102 puppet-user[67346]: Total: 14 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Events: Jan 23 09:10:26 np0005593102 puppet-user[67346]: Success: 14 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Total: 14 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Resources: Jan 23 09:10:26 np0005593102 puppet-user[67346]: Skipped: 12 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Changed: 14 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Out of sync: 14 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Total: 29 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Time: Jan 23 09:10:26 np0005593102 puppet-user[67346]: Exec: 0.03 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Config retrieval: 0.24 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Vs config: 0.44 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Transaction evaluation: 0.52 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Catalog application: 0.53 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Last run: 1769159426 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Total: 0.53 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Version: Jan 23 09:10:26 np0005593102 puppet-user[67346]: Config: 1769159425 Jan 23 09:10:26 np0005593102 puppet-user[67346]: Puppet: 7.10.0 Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Metadata/Nova_config[api/local_metadata_per_cell]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/service_metadata_proxy]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/metadata_proxy_shared_secret]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Warning: Scope(Apache::Vhost[placement_wsgi]): Jan 23 09:10:26 np0005593102 puppet-user[67370]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:26 np0005593102 puppet-user[67370]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:26 np0005593102 puppet-user[67370]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:26 np0005593102 puppet-user[67370]: file names. Jan 23 09:10:26 np0005593102 puppet-user[67370]: Jan 23 09:10:26 np0005593102 puppet-user[67370]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:26 np0005593102 puppet-user[67370]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:26 np0005593102 puppet-user[67370]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Jan 23 09:10:26 np0005593102 systemd[1]: libpod-a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4.scope: Deactivated successfully. Jan 23 09:10:26 np0005593102 systemd[1]: libpod-a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4.scope: Consumed 2.801s CPU time. Jan 23 09:10:26 np0005593102 podman[67255]: 2026-01-23 09:10:26.539630745 +0000 UTC m=+3.193504876 container died a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.expose-services=, architecture=x86_64, com.redhat.component=openstack-ovn-controller-container, url=https://www.redhat.com, batch=17.1_20251118.1, build-date=2025-11-18T23:34:05Z, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, distribution-scope=public, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, vcs-type=git, release=1761123044, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ovn-controller, container_name=container-puppet-ovn_controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller) Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.20 seconds Jan 23 09:10:26 np0005593102 systemd[1]: tmp-crun.hvPzrg.mount: Deactivated successfully. Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:26 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:26 np0005593102 systemd[1]: var-lib-containers-storage-overlay-5000db2a0fa7528837b455fa141f7c3275fa123f6e0facd60da6b571b9859ce4-merged.mount: Deactivated successfully. Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:26 np0005593102 podman[68001]: 2026-01-23 09:10:26.662355313 +0000 UTC m=+0.109552418 container cleanup a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, batch=17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, name=rhosp17/openstack-ovn-controller, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, vcs-type=git, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, release=1761123044, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T23:34:05Z, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-ovn-controller-container, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, container_name=container-puppet-ovn_controller, distribution-scope=public, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, tcib_managed=true) Jan 23 09:10:26 np0005593102 systemd[1]: libpod-conmon-a396f2c4e9718155181bc3b6814422e852e3ded8634da54e4996193efb3f91d4.scope: Deactivated successfully. Jan 23 09:10:26 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ovn_controller --conmon-pidfile /run/container-puppet-ovn_controller.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,vs_config,exec --env NAME=ovn_controller --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::agents::ovn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ovn_controller --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ovn_controller.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /etc/sysconfig/modules:/etc/sysconfig/modules --volume /lib/modules:/lib/modules:ro --volume /run/openvswitch:/run/openvswitch:shared,z --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/debug]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_file]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Db/Oslo::Db[placement_config]/Placement_config[placement_database/connection]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:26 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:27 np0005593102 podman[68068]: 2026-01-23 09:10:27.009781094 +0000 UTC m=+0.065903458 container create 5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, managed_by=tripleo_ansible, com.redhat.component=openstack-rsyslog-container, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, version=17.1.12, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, name=rhosp17/openstack-rsyslog, io.openshift.expose-services=, build-date=2025-11-18T22:49:49Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 rsyslog, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-rsyslog, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, vcs-type=git, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, release=1761123044) Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:27 np0005593102 systemd[1]: Started libpod-conmon-5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01.scope. Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:27 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:27 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0d27a0552e150e86058231cf0ac5293592597e4994ddbc296012d8b6650181cd/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:27 np0005593102 podman[68068]: 2026-01-23 09:10:27.052124674 +0000 UTC m=+0.108247038 container init 5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, config_id=tripleo_puppet_step1, release=1761123044, build-date=2025-11-18T22:49:49Z, managed_by=tripleo_ansible, name=rhosp17/openstack-rsyslog, vendor=Red Hat, Inc., url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, com.redhat.component=openstack-rsyslog-container, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, distribution-scope=public, container_name=container-puppet-rsyslog, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true) Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}bad04a22292dc3e3eaa2dc1af003113f35ecad3d2dea59f97f280e917a2bf870' Jan 23 09:10:27 np0005593102 podman[68068]: 2026-01-23 09:10:27.060224471 +0000 UTC m=+0.116346835 container start 5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, build-date=2025-11-18T22:49:49Z, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.component=openstack-rsyslog-container, tcib_managed=true, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 rsyslog, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, release=1761123044, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, name=rhosp17/openstack-rsyslog, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, vcs-type=git, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-rsyslog) Jan 23 09:10:27 np0005593102 podman[68068]: 2026-01-23 09:10:27.060416927 +0000 UTC m=+0.116539281 container attach 5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, vcs-type=git, version=17.1.12, managed_by=tripleo_ansible, distribution-scope=public, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, release=1761123044, container_name=container-puppet-rsyslog, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-rsyslog, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, url=https://www.redhat.com, build-date=2025-11-18T22:49:49Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., com.redhat.component=openstack-rsyslog-container, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:27 np0005593102 podman[68068]: 2026-01-23 09:10:26.976315035 +0000 UTC m=+0.032437419 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_scope]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_new_defaults]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Wsgi::Apache/File[/etc/httpd/conf.d/00-placement-api.conf]/content: content changed '{sha256}829e74856246ff8f4a56a4995cd421edd210e3c0342c998de9e934d33c2d229f' to '{sha256}a742a33fca7bd0225b70d9c9c3f9977f3f5b1391a7c4db389c2e405e7a0e7ecc' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[/var/www/cgi-bin/placement]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[placement_wsgi]/ensure: defined content as '{sha256}7330573e2f484b77671e7cd10bec4bf8fe4471ba5a127b8362286c6c89a050fe' Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/Apache::Vhost[placement_wsgi]/Concat[10-placement_wsgi.conf]/File[/etc/httpd/conf.d/10-placement_wsgi.conf]/ensure: defined content as '{sha256}34798fad1fcfe20ec8230a55dedf4a52fe6f9224d7e012cee6cec447109abeb7' Jan 23 09:10:27 np0005593102 puppet-user[67370]: Notice: Applied catalog in 0.53 seconds Jan 23 09:10:27 np0005593102 puppet-user[67370]: Application: Jan 23 09:10:27 np0005593102 puppet-user[67370]: Initial environment: production Jan 23 09:10:27 np0005593102 puppet-user[67370]: Converged environment: production Jan 23 09:10:27 np0005593102 puppet-user[67370]: Run mode: user Jan 23 09:10:27 np0005593102 puppet-user[67370]: Changes: Jan 23 09:10:27 np0005593102 puppet-user[67370]: Total: 63 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Events: Jan 23 09:10:27 np0005593102 puppet-user[67370]: Success: 63 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Total: 63 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Resources: Jan 23 09:10:27 np0005593102 puppet-user[67370]: Skipped: 31 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Changed: 63 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Out of sync: 63 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Total: 208 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Time: Jan 23 09:10:27 np0005593102 puppet-user[67370]: Concat file: 0.00 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Anchor: 0.00 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Concat fragment: 0.00 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Augeas: 0.02 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Package: 0.02 Jan 23 09:10:27 np0005593102 puppet-user[67370]: File: 0.13 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Placement config: 0.15 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Transaction evaluation: 0.52 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Catalog application: 0.53 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Config retrieval: 1.31 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Last run: 1769159427 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Total: 0.53 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Version: Jan 23 09:10:27 np0005593102 puppet-user[67370]: Config: 1769159425 Jan 23 09:10:27 np0005593102 puppet-user[67370]: Puppet: 7.10.0 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_scope]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_new_defaults]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Api/Oslo::Middleware[nova_config]/Nova_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Cron::Archive_deleted_rows/Cron[nova-manage db archive_deleted_rows]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Cron::Purge_shadow_tables/Cron[nova-manage db purge]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/Apache::Vhost[nova_api_wsgi]/Concat[10-nova_api_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_api_wsgi.conf]/ensure: defined content as '{sha256}b395633990ef7ceee36168a7567544c6ecdfe4c47d0349f0e5b68f2a155335a2' Jan 23 09:10:27 np0005593102 systemd[1]: libpod-d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7.scope: Deactivated successfully. Jan 23 09:10:27 np0005593102 systemd[1]: libpod-d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7.scope: Consumed 3.834s CPU time. Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66511]: Notice: Applied catalog in 3.72 seconds Jan 23 09:10:27 np0005593102 puppet-user[66511]: Application: Jan 23 09:10:27 np0005593102 puppet-user[66511]: Initial environment: production Jan 23 09:10:27 np0005593102 puppet-user[66511]: Converged environment: production Jan 23 09:10:27 np0005593102 puppet-user[66511]: Run mode: user Jan 23 09:10:27 np0005593102 puppet-user[66511]: Changes: Jan 23 09:10:27 np0005593102 puppet-user[66511]: Total: 156 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Events: Jan 23 09:10:27 np0005593102 puppet-user[66511]: Success: 156 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Total: 156 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Resources: Jan 23 09:10:27 np0005593102 puppet-user[66511]: Changed: 156 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Out of sync: 156 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Skipped: 45 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Total: 511 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Time: Jan 23 09:10:27 np0005593102 puppet-user[66511]: Concat file: 0.00 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Anchor: 0.00 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Concat fragment: 0.00 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Package: 0.03 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Augeas: 0.03 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Cron: 0.04 Jan 23 09:10:27 np0005593102 puppet-user[66511]: File: 0.12 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Config retrieval: 1.87 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Last run: 1769159427 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Nova config: 3.15 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Transaction evaluation: 3.70 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Catalog application: 3.72 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Resources: 0.00 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Total: 3.72 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Version: Jan 23 09:10:27 np0005593102 puppet-user[66511]: Config: 1769159422 Jan 23 09:10:27 np0005593102 puppet-user[66511]: Puppet: 7.10.0 Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:27 np0005593102 podman[68234]: 2026-01-23 09:10:27.778522038 +0000 UTC m=+0.056212193 container died d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, version=17.1.12, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.expose-services=, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, build-date=2025-11-18T23:41:26Z, description=Red Hat OpenStack Platform 17.1 placement-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, container_name=container-puppet-placement, url=https://www.redhat.com, vcs-type=git, name=rhosp17/openstack-placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, distribution-scope=public, com.redhat.component=openstack-placement-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d) Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:27 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:27 np0005593102 systemd[1]: var-lib-containers-storage-overlay-91026dad9d8c45b7d749379a4b1026100a064ffe5d735d4281f2ac30cf29a4bd-merged.mount: Deactivated successfully. Jan 23 09:10:27 np0005593102 podman[68234]: 2026-01-23 09:10:27.832790101 +0000 UTC m=+0.110480286 container cleanup d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, container_name=container-puppet-placement, description=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vcs-type=git, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-placement-api, com.redhat.component=openstack-placement-api-container, summary=Red Hat OpenStack Platform 17.1 placement-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, tcib_managed=true, distribution-scope=public, release=1761123044, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, build-date=2025-11-18T23:41:26Z) Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:27 np0005593102 systemd[1]: libpod-conmon-d5e9f33ccfa24b4e312d445ce26fe1371fcb410b4af92e175208281f0149c3e7.scope: Deactivated successfully. Jan 23 09:10:27 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-placement --conmon-pidfile /run/container-puppet-placement.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,placement_config --env NAME=placement --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::placement::api --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-placement --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-placement.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Jan 23 09:10:27 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Jan 23 09:10:28 np0005593102 podman[68309]: 2026-01-23 09:10:28.195963772 +0000 UTC m=+0.064509226 container create d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, container_name=container-puppet-swift, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, build-date=2025-11-19T00:12:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, vcs-type=git, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, tcib_managed=true, com.redhat.component=openstack-swift-proxy-server-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, vendor=Red Hat, Inc., name=rhosp17/openstack-swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, distribution-scope=public) Jan 23 09:10:28 np0005593102 systemd[1]: Started libpod-conmon-d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131.scope. Jan 23 09:10:28 np0005593102 systemd[1]: tmp-crun.4jjPYq.mount: Deactivated successfully. Jan 23 09:10:28 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:28 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/003b9af2115e91ab62f749eed0a9aec670ee772e05ed6f1162327c5f7692991e/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:28 np0005593102 podman[68309]: 2026-01-23 09:10:28.250834953 +0000 UTC m=+0.119380407 container init d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, io.openshift.expose-services=, tcib_managed=true, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, vcs-type=git, build-date=2025-11-19T00:12:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, distribution-scope=public, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, architecture=x86_64, release=1761123044, version=17.1.12, com.redhat.component=openstack-swift-proxy-server-container, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1) Jan 23 09:10:28 np0005593102 puppet-user[67879]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:28 np0005593102 puppet-user[67879]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:28 np0005593102 puppet-user[67879]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:28 np0005593102 puppet-user[67879]: (file & line not available) Jan 23 09:10:28 np0005593102 podman[68309]: 2026-01-23 09:10:28.262243601 +0000 UTC m=+0.130789085 container start d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, url=https://www.redhat.com, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, version=17.1.12, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, tcib_managed=true, vcs-type=git, build-date=2025-11-19T00:12:50Z, release=1761123044, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-swift-proxy-server, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift, vendor=Red Hat, Inc.) Jan 23 09:10:28 np0005593102 podman[68309]: 2026-01-23 09:10:28.262488428 +0000 UTC m=+0.131033892 container attach d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.12, architecture=x86_64, build-date=2025-11-19T00:12:50Z, name=rhosp17/openstack-swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, vcs-type=git, container_name=container-puppet-swift, io.openshift.expose-services=, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, url=https://www.redhat.com, vendor=Red Hat, Inc.) Jan 23 09:10:28 np0005593102 podman[68309]: 2026-01-23 09:10:28.166934538 +0000 UTC m=+0.035480012 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[nova_metadata_wsgi]/ensure: defined content as '{sha256}7311c9047eec89f1e952197038ebb53e3ab5810905e7292a2f802c7e4fc0351c' Jan 23 09:10:28 np0005593102 puppet-user[67879]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:28 np0005593102 puppet-user[67879]: (file & line not available) Jan 23 09:10:28 np0005593102 puppet-user[67584]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:28 np0005593102 puppet-user[67584]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:28 np0005593102 puppet-user[67584]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:28 np0005593102 puppet-user[67584]: (file & line not available) Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:28 np0005593102 puppet-user[67584]: (file & line not available) Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/Apache::Vhost[nova_metadata_wsgi]/Concat[10-nova_metadata_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_metadata_wsgi.conf]/ensure: defined content as '{sha256}901b61388951e0d9c3800ff1046b428baf52c19659e0d1b4f183fdb66811b5d7' Jan 23 09:10:28 np0005593102 sshd[68472]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:28 np0005593102 puppet-user[66906]: Notice: Applied catalog in 3.15 seconds Jan 23 09:10:28 np0005593102 puppet-user[66906]: Application: Jan 23 09:10:28 np0005593102 puppet-user[66906]: Initial environment: production Jan 23 09:10:28 np0005593102 puppet-user[66906]: Converged environment: production Jan 23 09:10:28 np0005593102 puppet-user[66906]: Run mode: user Jan 23 09:10:28 np0005593102 puppet-user[66906]: Changes: Jan 23 09:10:28 np0005593102 puppet-user[66906]: Total: 126 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Events: Jan 23 09:10:28 np0005593102 puppet-user[66906]: Success: 126 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Total: 126 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Resources: Jan 23 09:10:28 np0005593102 puppet-user[66906]: Changed: 126 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Out of sync: 126 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Skipped: 37 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Total: 421 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Time: Jan 23 09:10:28 np0005593102 puppet-user[66906]: Concat file: 0.00 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Anchor: 0.00 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Concat fragment: 0.00 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Package: 0.01 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Augeas: 0.02 Jan 23 09:10:28 np0005593102 puppet-user[66906]: File: 0.27 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Config retrieval: 1.66 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Last run: 1769159428 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Nova config: 2.54 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Transaction evaluation: 3.13 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Catalog application: 3.15 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Resources: 0.00 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Total: 3.15 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Version: Jan 23 09:10:28 np0005593102 puppet-user[66906]: Config: 1769159423 Jan 23 09:10:28 np0005593102 puppet-user[66906]: Puppet: 7.10.0 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.19 seconds Jan 23 09:10:28 np0005593102 puppet-user[67879]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.27 seconds Jan 23 09:10:28 np0005593102 systemd[1]: libpod-2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce.scope: Deactivated successfully. Jan 23 09:10:28 np0005593102 systemd[1]: libpod-2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce.scope: Consumed 8.126s CPU time. Jan 23 09:10:28 np0005593102 podman[66463]: 2026-01-23 09:10:28.577224674 +0000 UTC m=+8.588961816 container died 2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, architecture=x86_64, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp17/openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, container_name=container-puppet-nova, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, distribution-scope=public, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-19T00:34:57Z, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, vcs-type=git, release=1761123044, version=17.1.12, maintainer=OpenStack TripleO Team) Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq]/mode: mode changed '0755' to '2755' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Tripleo::Profile::Base::Rabbitmq/File[/etc/rabbitmq/ssl-dist.conf]/ensure: defined content as '{sha256}4fcb8b2c0ce7c31ae2a64808de62371e284138a67310e23f1c73dbf139a874c7' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq/ssl]/ensure: created Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-env.config]/ensure: defined content as '{sha256}1b1626287c25b58adf8b736ea3dc7d7b1ea484244d66d98227560aec6c1c1fc6' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-inetrc]/ensure: defined content as '{sha256}b83b8080dbcdf2a49fff2f747972e7343801f7518a0f1dcb3e2a301e50aef551' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Rabbitmq::Config/File[enabled_plugins]/ensure: defined content as '{sha256}3b5c9fba2f1456d923499fc142bc9ef7a7f6d53d6bc4c0ae88310332eb10a31c' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/security/limits.d/rabbitmq-server.conf]/ensure: defined content as '{sha256}b984a5f0a62696715f206ca0a602fd9d2d497894c6c24502896fb3010ee0c557' Jan 23 09:10:28 np0005593102 puppet-user[67879]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Redis_bundle/File[/etc/redis-tls.conf]/ensure: defined content as '{sha256}05ac47acbffedaa4e406118e2985b44e9c057e03a329dce9f63452238f47cc2a' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq.config]/ensure: defined content as '{sha256}783d9211faa2baa755b127065b7e7214de5e7c70fe0acfe68365c4f1c81941cd' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File[/var/lib/rabbitmq/.erlang.cookie]/content: content changed '{sha256}e1d3a8391262e8dbfc1c01ec025f39397a8e163d410dd85d366d8c055705df5f' to '{sha256}2f7a4fa2366ae6f1f7dea2b261a26589439927f7963d88121341ecda7c26de92' Jan 23 09:10:28 np0005593102 puppet-user[67879]: Notice: /Stage[main]/Tripleo::Stunnel/Concat[/etc/stunnel/stunnel.conf]/File[/etc/stunnel/stunnel.conf]/ensure: defined content as '{sha256}cd41ab2755917de167c1ac35c93dec78728196ff04e3f7abce6079783adaaf85' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-systemd]/ensure: removed Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-succeed]/ensure: created Jan 23 09:10:28 np0005593102 puppet-user[67879]: Notice: /Stage[main]/Redis::Config/File[/etc/redis]/mode: mode changed '0750' to '0755' Jan 23 09:10:28 np0005593102 puppet-user[67584]: Notice: Applied catalog in 0.10 seconds Jan 23 09:10:28 np0005593102 puppet-user[67584]: Application: Jan 23 09:10:28 np0005593102 puppet-user[67584]: Initial environment: production Jan 23 09:10:28 np0005593102 puppet-user[67584]: Converged environment: production Jan 23 09:10:28 np0005593102 puppet-user[67584]: Run mode: user Jan 23 09:10:28 np0005593102 puppet-user[67584]: Changes: Jan 23 09:10:28 np0005593102 puppet-user[67584]: Total: 11 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Events: Jan 23 09:10:28 np0005593102 puppet-user[67584]: Success: 11 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Total: 11 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Resources: Jan 23 09:10:28 np0005593102 puppet-user[67584]: Changed: 11 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Out of sync: 11 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Skipped: 9 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Total: 20 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Time: Jan 23 09:10:28 np0005593102 puppet-user[67584]: File line: 0.00 Jan 23 09:10:28 np0005593102 puppet-user[67584]: File: 0.03 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Transaction evaluation: 0.09 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Catalog application: 0.10 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Config retrieval: 0.22 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Last run: 1769159428 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Total: 0.10 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Version: Jan 23 09:10:28 np0005593102 puppet-user[67584]: Config: 1769159428 Jan 23 09:10:28 np0005593102 puppet-user[67584]: Puppet: 7.10.0 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/security/limits.d/redis.conf]/ensure: defined content as '{sha256}4723daf91256d1c55ef938214e69b3359209d2df79c3dceb8b8352faf4c8886d' Jan 23 09:10:28 np0005593102 puppet-user[67879]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/systemd/system/redis.service.d/limit.conf]/mode: mode changed '0644' to '0444' Jan 23 09:10:28 np0005593102 podman[68485]: 2026-01-23 09:10:28.651455495 +0000 UTC m=+0.064253888 container cleanup 2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, architecture=x86_64, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-nova-api-container, distribution-scope=public, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, container_name=container-puppet-nova, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, build-date=2025-11-19T00:34:57Z, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-nova-api, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, release=1761123044, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, io.openshift.expose-services=) Jan 23 09:10:28 np0005593102 puppet-user[67879]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/File[/etc/redis.conf.puppet]/ensure: defined content as '{sha256}e5e6cee42b4144e1067e4195860069cf4387fae792740f3ac9609247cbde950b' Jan 23 09:10:28 np0005593102 systemd[1]: libpod-conmon-2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce.scope: Deactivated successfully. Jan 23 09:10:28 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova --conmon-pidfile /run/container-puppet-nova.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config --env NAME=nova --env STEP_CONFIG=include ::tripleo::packages#012['Nova_cell_v2'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::nova::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::conductor#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::vncproxy#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/Exec[cp -p /etc/redis.conf.puppet /etc/redis.conf]: Triggered 'refresh' from 1 event Jan 23 09:10:28 np0005593102 puppet-user[67879]: Notice: Applied catalog in 0.08 seconds Jan 23 09:10:28 np0005593102 puppet-user[67879]: Application: Jan 23 09:10:28 np0005593102 puppet-user[67879]: Initial environment: production Jan 23 09:10:28 np0005593102 puppet-user[67879]: Converged environment: production Jan 23 09:10:28 np0005593102 puppet-user[67879]: Run mode: user Jan 23 09:10:28 np0005593102 puppet-user[67879]: Changes: Jan 23 09:10:28 np0005593102 puppet-user[67879]: Total: 7 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Events: Jan 23 09:10:28 np0005593102 puppet-user[67879]: Success: 7 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Total: 7 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Resources: Jan 23 09:10:28 np0005593102 puppet-user[67879]: Restarted: 1 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Changed: 7 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Out of sync: 7 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Skipped: 9 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Total: 25 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Time: Jan 23 09:10:28 np0005593102 puppet-user[67879]: Concat fragment: 0.00 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Exec: 0.00 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Augeas: 0.01 Jan 23 09:10:28 np0005593102 puppet-user[67879]: File: 0.03 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Transaction evaluation: 0.08 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Catalog application: 0.08 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Config retrieval: 0.36 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Last run: 1769159428 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Concat file: 0.00 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Total: 0.08 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Version: Jan 23 09:10:28 np0005593102 puppet-user[67879]: Config: 1769159428 Jan 23 09:10:28 np0005593102 puppet-user[67879]: Puppet: 7.10.0 Jan 23 09:10:28 np0005593102 puppet-user[68132]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:28 np0005593102 puppet-user[68132]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:28 np0005593102 puppet-user[68132]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:28 np0005593102 puppet-user[68132]: (file & line not available) Jan 23 09:10:28 np0005593102 puppet-user[68132]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:28 np0005593102 puppet-user[68132]: (file & line not available) Jan 23 09:10:28 np0005593102 systemd[1]: libpod-03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade.scope: Deactivated successfully. Jan 23 09:10:28 np0005593102 systemd[1]: libpod-03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade.scope: Consumed 4.880s CPU time. Jan 23 09:10:28 np0005593102 podman[67553]: 2026-01-23 09:10:28.950908886 +0000 UTC m=+4.456799563 container died 03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, tcib_managed=true, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, architecture=x86_64, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, release=1761123044, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, version=17.1.12, io.openshift.expose-services=, container_name=container-puppet-rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:50Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp17/openstack-rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:29 np0005593102 systemd[1]: libpod-7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f.scope: Deactivated successfully. Jan 23 09:10:29 np0005593102 systemd[1]: libpod-7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f.scope: Consumed 2.800s CPU time. Jan 23 09:10:29 np0005593102 podman[67842]: 2026-01-23 09:10:29.02823008 +0000 UTC m=+3.156688795 container died 7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, version=17.1.12, tcib_managed=true, config_id=tripleo_puppet_step1, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 redis, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.component=openstack-redis-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, container_name=container-puppet-redis, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-redis, summary=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, build-date=2025-11-18T22:49:49Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:29 np0005593102 podman[68675]: 2026-01-23 09:10:29.151417152 +0000 UTC m=+0.194400852 container cleanup 03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, url=https://www.redhat.com, build-date=2025-11-18T22:49:50Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, vcs-type=git, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp17/openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container, version=17.1.12, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.4, batch=17.1_20251118.1, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, container_name=container-puppet-rabbitmq, io.openshift.expose-services=, managed_by=tripleo_ansible) Jan 23 09:10:29 np0005593102 systemd[1]: libpod-conmon-03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade.scope: Deactivated successfully. Jan 23 09:10:29 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rabbitmq --conmon-pidfile /run/container-puppet-rabbitmq.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file,file_line --env NAME=rabbitmq --env STEP_CONFIG=include ::tripleo::packages#012['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::rabbitmq_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rabbitmq --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rabbitmq.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 09:10:29 np0005593102 podman[68694]: 2026-01-23 09:10:29.081338227 +0000 UTC m=+0.086939458 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 09:10:29 np0005593102 podman[68694]: 2026-01-23 09:10:29.198323341 +0000 UTC m=+0.203924572 container create a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, release=1761123044, com.redhat.component=openstack-swift-proxy-server-container, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, container_name=container-puppet-swift_ringbuilder, architecture=x86_64, config_id=tripleo_puppet_step1, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2025-11-19T00:12:50Z, maintainer=OpenStack TripleO Team) Jan 23 09:10:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay-efe17248a83a482bfe43ad758d53ffe51faf8812da8d416ff55255e820dd0a58-merged.mount: Deactivated successfully. Jan 23 09:10:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay-b6f8da410f418056bb69ecd59496cc38b7211f744260a02e97442bfa3061ff5b-merged.mount: Deactivated successfully. Jan 23 09:10:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-03eb6c1c1c82aac61e2bc9742c9b0b6bd166c45491e676fe7adc66e29dc90ade-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay-6f75752afc89c041da49eb99ca7cd6f0a7cadd2a62d19f8e5681d51766ce02de-merged.mount: Deactivated successfully. Jan 23 09:10:29 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-2fe55953421a2daa5011b2ae0a0fa3882c6bd6a5a7ebc28b1509f5ad30d1a9ce-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:29 np0005593102 podman[68715]: 2026-01-23 09:10:29.225501909 +0000 UTC m=+0.190438021 container cleanup 7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, architecture=x86_64, config_id=tripleo_puppet_step1, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.4, io.openshift.expose-services=, release=1761123044, container_name=container-puppet-redis, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 redis, build-date=2025-11-18T22:49:49Z, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, com.redhat.component=openstack-redis-container, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., name=rhosp17/openstack-redis) Jan 23 09:10:29 np0005593102 systemd[1]: libpod-conmon-7a0f7029e432cce8c2006f9b812caea5df3a50c85410c9d82fbfd19918a2671f.scope: Deactivated successfully. Jan 23 09:10:29 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-redis --conmon-pidfile /run/container-puppet-redis.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,exec --env NAME=redis --env STEP_CONFIG=include ::tripleo::packages#012Exec <| title == 'systemd-reload-redis' |> { unless => 'true' }#012include tripleo::profile::pacemaker::database::redis_bundle#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-redis --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-redis.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.39 seconds Jan 23 09:10:29 np0005593102 systemd[1]: Started libpod-conmon-a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3.scope. Jan 23 09:10:29 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:29 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/92d3976d1ce0cd16157124922e9e628f178c572ea7f40295d075acf571af6bd7/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:29 np0005593102 systemd[1]: libpod-68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001.scope: Deactivated successfully. Jan 23 09:10:29 np0005593102 systemd[1]: libpod-68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001.scope: Consumed 7.115s CPU time. Jan 23 09:10:29 np0005593102 podman[66840]: 2026-01-23 09:10:29.355733405 +0000 UTC m=+7.731632294 container died 68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.component=openstack-nova-api-container, vendor=Red Hat, Inc., container_name=container-puppet-nova_metadata, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, build-date=2025-11-19T00:34:57Z, maintainer=OpenStack TripleO Team, vcs-type=git, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, name=rhosp17/openstack-nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, version=17.1.12) Jan 23 09:10:29 np0005593102 podman[68804]: 2026-01-23 09:10:29.417078733 +0000 UTC m=+0.052965564 container cleanup 68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 nova-api, release=1761123044, build-date=2025-11-19T00:34:57Z, name=rhosp17/openstack-nova-api, config_id=tripleo_puppet_step1, io.openshift.expose-services=, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, version=17.1.12, container_name=container-puppet-nova_metadata, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, batch=17.1_20251118.1, com.redhat.component=openstack-nova-api-container, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, vendor=Red Hat, Inc., io.buildah.version=1.41.4, managed_by=tripleo_ansible, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:29 np0005593102 systemd[1]: libpod-conmon-68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001.scope: Deactivated successfully. Jan 23 09:10:29 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova_metadata --conmon-pidfile /run/container-puppet-nova_metadata.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini --env NAME=nova_metadata --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::nova::metadata#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova_metadata --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova_metadata.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Notice: /Stage[main]/Rsyslog::Base/File[/etc/rsyslog.conf]/content: content changed '{sha256}d6f679f6a4eb6f33f9fc20c846cb30bef93811e1c86bc4da1946dc3100b826c3' to '{sha256}7963bd801fadd49a17561f4d3f80738c3f504b413b11c443432d8303138041f2' Jan 23 09:10:29 np0005593102 podman[68694]: 2026-01-23 09:10:29.448378146 +0000 UTC m=+0.453979377 container init a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, io.openshift.expose-services=, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, container_name=container-puppet-swift_ringbuilder, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2025-11-19T00:12:50Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, architecture=x86_64, name=rhosp17/openstack-swift-proxy-server, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, version=17.1.12, io.buildah.version=1.41.4, vcs-type=git, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1761123044, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:29 np0005593102 podman[68694]: 2026-01-23 09:10:29.456847684 +0000 UTC m=+0.462448915 container start a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, vendor=Red Hat, Inc., vcs-type=git, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.openshift.expose-services=, container_name=container-puppet-swift_ringbuilder, version=17.1.12, distribution-scope=public, architecture=x86_64, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, config_id=tripleo_puppet_step1, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-19T00:12:50Z, release=1761123044, name=rhosp17/openstack-swift-proxy-server, io.buildah.version=1.41.4) Jan 23 09:10:29 np0005593102 podman[68694]: 2026-01-23 09:10:29.4570498 +0000 UTC m=+0.462651061 container attach a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, name=rhosp17/openstack-swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-swift_ringbuilder, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, url=https://www.redhat.com, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1761123044, maintainer=OpenStack TripleO Team, build-date=2025-11-19T00:12:50Z, architecture=x86_64, com.redhat.component=openstack-swift-proxy-server-container, vcs-type=git, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, vendor=Red Hat, Inc.) Jan 23 09:10:29 np0005593102 puppet-user[68132]: Notice: /Stage[main]/Rsyslog::Config::Global/Rsyslog::Component::Global_config[MaxMessageSize]/Rsyslog::Generate_concat[rsyslog::concat::global_config::MaxMessageSize]/Concat[/etc/rsyslog.d/00_rsyslog.conf]/File[/etc/rsyslog.d/00_rsyslog.conf]/ensure: defined content as '{sha256}a291d5cc6d5884a978161f4c7b5831d43edd07797cc590bae366e7f150b8643b' Jan 23 09:10:29 np0005593102 puppet-user[68132]: Notice: /Stage[main]/Rsyslog::Config::Templates/Rsyslog::Component::Template[rsyslog-node-index]/Rsyslog::Generate_concat[rsyslog::concat::template::rsyslog-node-index]/Concat[/etc/rsyslog.d/50_openstack_logs.conf]/File[/etc/rsyslog.d/50_openstack_logs.conf]/ensure: defined content as '{sha256}139b0c15c84559ccfd7bb2a30baea9e08f12835a77e128b9c69b37c088348fff' Jan 23 09:10:29 np0005593102 puppet-user[68132]: Notice: Applied catalog in 0.17 seconds Jan 23 09:10:29 np0005593102 puppet-user[68132]: Application: Jan 23 09:10:29 np0005593102 puppet-user[68132]: Initial environment: production Jan 23 09:10:29 np0005593102 puppet-user[68132]: Converged environment: production Jan 23 09:10:29 np0005593102 puppet-user[68132]: Run mode: user Jan 23 09:10:29 np0005593102 puppet-user[68132]: Changes: Jan 23 09:10:29 np0005593102 puppet-user[68132]: Total: 3 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Events: Jan 23 09:10:29 np0005593102 puppet-user[68132]: Success: 3 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Total: 3 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Resources: Jan 23 09:10:29 np0005593102 puppet-user[68132]: Skipped: 11 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Changed: 3 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Out of sync: 3 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Total: 45 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Time: Jan 23 09:10:29 np0005593102 puppet-user[68132]: Concat file: 0.00 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Concat fragment: 0.00 Jan 23 09:10:29 np0005593102 puppet-user[68132]: File: 0.02 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Transaction evaluation: 0.16 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Catalog application: 0.17 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Config retrieval: 0.45 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Last run: 1769159429 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Total: 0.17 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Version: Jan 23 09:10:29 np0005593102 puppet-user[68132]: Config: 1769159428 Jan 23 09:10:29 np0005593102 puppet-user[68132]: Puppet: 7.10.0 Jan 23 09:10:29 np0005593102 systemd[1]: libpod-5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01.scope: Deactivated successfully. Jan 23 09:10:29 np0005593102 systemd[1]: libpod-5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01.scope: Consumed 2.590s CPU time. Jan 23 09:10:29 np0005593102 podman[68068]: 2026-01-23 09:10:29.804862035 +0000 UTC m=+2.860984449 container died 5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, build-date=2025-11-18T22:49:49Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-rsyslog, com.redhat.component=openstack-rsyslog-container, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-rsyslog, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, release=1761123044, config_id=tripleo_puppet_step1, url=https://www.redhat.com, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.4, vcs-type=git, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 rsyslog, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible) Jan 23 09:10:29 np0005593102 podman[68892]: 2026-01-23 09:10:29.907780808 +0000 UTC m=+0.089493166 container cleanup 5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, build-date=2025-11-18T22:49:49Z, batch=17.1_20251118.1, managed_by=tripleo_ansible, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-rsyslog, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-rsyslog-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, distribution-scope=public, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.4, version=17.1.12, architecture=x86_64, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044) Jan 23 09:10:29 np0005593102 systemd[1]: libpod-conmon-5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01.scope: Deactivated successfully. Jan 23 09:10:29 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rsyslog --conmon-pidfile /run/container-puppet-rsyslog.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment --env NAME=rsyslog --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::rsyslog --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rsyslog --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rsyslog.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Jan 23 09:10:30 np0005593102 systemd[1]: var-lib-containers-storage-overlay-0d27a0552e150e86058231cf0ac5293592597e4994ddbc296012d8b6650181cd-merged.mount: Deactivated successfully. Jan 23 09:10:30 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-5b85bec625fd6d841974fe67fba4c03f90adcb8e40a6248588d8f52f42a7dd01-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:30 np0005593102 systemd[1]: var-lib-containers-storage-overlay-17638a7cb6187f13073b1c1964508e4a29d9167e4382ac3d881fa6aeec5d7bed-merged.mount: Deactivated successfully. Jan 23 09:10:30 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-68f15172d3f1140896fd73538222fe5d971e5ea57a8c80961e11ff38cc5a3001-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:30 np0005593102 puppet-user[68458]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:30 np0005593102 puppet-user[68458]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:30 np0005593102 puppet-user[68458]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:30 np0005593102 puppet-user[68458]: (file & line not available) Jan 23 09:10:30 np0005593102 puppet-user[68458]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:30 np0005593102 puppet-user[68458]: (file & line not available) Jan 23 09:10:30 np0005593102 puppet-user[68458]: Warning: Scope(Class[Swift::Proxy::S3token]): Usage of the default password is deprecated and will be removed in a future release. \ Jan 23 09:10:30 np0005593102 puppet-user[68458]: Please set password parameter Jan 23 09:10:30 np0005593102 puppet-user[68458]: Warning: Scope(Class[Swift::Keymaster]): password parameter is missing Jan 23 09:10:30 np0005593102 puppet-user[68458]: Warning: Scope(Class[Swift::Storage::All]): The default port for the object storage server has changed \ Jan 23 09:10:30 np0005593102 puppet-user[68458]: from 6000 to 6200 and will be changed in a later release Jan 23 09:10:30 np0005593102 puppet-user[68458]: Warning: Scope(Class[Swift::Storage::All]): The default port for the container storage server has changed \ Jan 23 09:10:30 np0005593102 puppet-user[68458]: from 6001 to 6201 and will be changed in a later release Jan 23 09:10:30 np0005593102 puppet-user[68458]: Warning: Scope(Class[Swift::Storage::All]): The default port for the account storage server has changed \ Jan 23 09:10:30 np0005593102 puppet-user[68458]: from 6002 to 6202 and will be changed in a later release Jan 23 09:10:31 np0005593102 puppet-user[68458]: Warning: Scope(Apache::Vhost[swift-proxy-api-proxy]): Jan 23 09:10:31 np0005593102 puppet-user[68458]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:31 np0005593102 puppet-user[68458]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:31 np0005593102 puppet-user[68458]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:31 np0005593102 puppet-user[68458]: file names. Jan 23 09:10:31 np0005593102 puppet-user[68458]: Jan 23 09:10:31 np0005593102 puppet-user[68458]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:31 np0005593102 puppet-user[68458]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:31 np0005593102 puppet-user[68458]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:31 np0005593102 puppet-user[68844]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:31 np0005593102 puppet-user[68844]: (file & line not available) Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:31 np0005593102 puppet-user[68844]: (file & line not available) Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 1.20 seconds Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Jan 23 09:10:31 np0005593102 puppet-user[68844]: Warning: validate_legacy(validate_re) expects an Integer value, got String at ["/etc/puppet/modules/swift/manifests/ringbuilder/rebalance.pp", 23]: Jan 23 09:10:31 np0005593102 puppet-user[68844]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Jan 23 09:10:31 np0005593102 puppet-user[68844]: Notice: Compiled catalog for np0005593102.ooo.test in environment production in 0.29 seconds Jan 23 09:10:31 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Jan 23 09:10:31 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Jan 23 09:10:31 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Jan 23 09:10:31 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to ZYnyHx5SV1KV0FNxclhRwlkQC Jan 23 09:10:31 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}a29aeff20ddf3424d30a25615dcdfa6e336850b5b7f5bd2b3e0b5899a55e0ad0' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}08dafe999aef965aaab6b71e2a4789dbdf314b17eb9bd582a558736c80bd0124' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Rsync::Server/Concat[/etc/rsyncd.conf]/File[/etc/rsyncd.conf]/content: content changed '{sha256}189b30972178b755e8e70eab81b1d261c4def61b342300f11760e6f2e706ff64' to '{sha256}411032608183f9e5b8b39ca066ad3afad91296d0f5b0212a6a000b83dbb9871f' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Rsync::Server/Service[rsyncd]/ensure: ensure changed 0 to 'running' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005593101.internalapi.ooo.test:11212,np0005593102.internalapi.ooo.test:11212,np0005593103.internalapi.ooo.test:11212 Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/tls_enabled]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:proxy-logging/use]/value: value changed egg:swift#poxy_logging to egg:swift#proxy_logging Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[pipeline:main/pipeline]/value: value changed catch_errors proxy-logging cache proxy-server to catch_errors cache proxy-server Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/auto_create_account_prefix]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/concurrency]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/expiring_objects_account_name]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/interval]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/process]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/processes]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/reclaim_age]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/recon_cache_path]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/report_interval]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_facility]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_level]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to ZYnyHx5SV1KV0FNxclhRwlkQC Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/bind_ip]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/workers]/value: value changed 8 to 1 Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_name]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_facility]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_level]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_headers]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_address]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[pipeline:main/pipeline]/value: value changed catch_errors gatekeeper healthcheck proxy-logging cache container_sync bulk tempurl ratelimit copy container-quotas account-quotas slo dlo versioned_writes proxy-logging proxy-server to catch_errors gatekeeper healthcheck proxy-logging cache listing_formats ratelimit bulk tempurl formpost authtoken s3api s3token keystone staticweb copy container_quotas account_quotas slo dlo versioned_writes proxy-logging proxy-server Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_name]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_facility]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_level]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_address]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/log_handoffs]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/object_chunk_size]/ensure: created Jan 23 09:10:31 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/client_chunk_size]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/allow_account_management]/value: value changed true to True Jan 23 09:10:32 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[object]/Exec[create_object]/returns: executed successfully Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/account_autocreate]/value: value changed true to True Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/max_containers_per_account]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/node_timeout]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/recoverable_node_timeout]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_name]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_facility]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_level]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_headers]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_address]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005593101.internalapi.ooo.test:11212,np0005593102.internalapi.ooo.test:11212,np0005593103.internalapi.ooo.test:11212 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/tls_enabled]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_max_connections]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Listing_formats/Swift_proxy_config[filter:listing_formats/use]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/clock_accuracy]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/max_sleep_time_seconds]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/log_sleep_time_seconds]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/rate_buffer_seconds]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/account_ratelimit]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_containers_per_extraction]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_failed_extractions]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_deletes_per_request]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/yield_frequency]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Formpost/Swift_proxy_config[filter:formpost/use]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/log_name]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_url]/value: value changed http://127.0.0.1:5000 to https://overcloud.internalapi.ooo.test:5000 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_type]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_domain_id]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/user_domain_id]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_name]/value: value changed %SERVICE_TENANT_NAME% to service Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/username]/value: value changed %SERVICE_USER% to swift Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/password]/value: value changed [old secret redacted] to [new secret redacted] Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/region_name]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/delay_auth_decision]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/cache]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/include_service_catalog]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/interface]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/use]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/auth_pipeline_check]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/use]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_uri]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/reseller_prefix]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/delay_auth_decision]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/secret_cache_duration]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_url]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_type]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/username]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/password]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_name]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_domain_id]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/user_domain_id]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/operator_roles]/value: value changed admin, SwiftOperator to admin, swiftoperator, ResellerAdmin Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/reseller_prefix]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/system_reader_roles]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/use]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/url_base]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Copy/Swift_proxy_config[filter:copy/object_post_as_copy]/value: value changed false to True Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Container_quotas/Swift_proxy_config[filter:container_quotas/use]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Account_quotas/Swift_proxy_config[filter:account_quotas/use]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_segments]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_size]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/min_segment_size]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_after_segment]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_segments_per_sec]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_get_time]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_after_segment]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_segments_per_sec]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/max_get_time]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Versioned_writes/Swift_proxy_config[filter:versioned_writes/allow_versioned_writes]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/use]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/keymaster_config_path]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/use]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/disable_encryption]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/api_class]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/username]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_name]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_domain_id]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/user_domain_id]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/meta_version_to_write]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node/d1]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Storage::Account/Swift::Storage::Generic[account]/File[/etc/swift/account-server/]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Storage::Container/Swift::Storage::Generic[container]/File[/etc/swift/container-server/]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Storage::Object/Swift::Storage::Generic[object]/File[/etc/swift/object-server/]/ensure: created Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6002]/Concat[/etc/swift/account-server.conf]/File[/etc/swift/account-server.conf]/ensure: defined content as '{sha256}5138ebbc3d5189b87d4200cfcfc6cfff3f5b5bb68beb210c3259530fc9ce3468' Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6001]/Concat[/etc/swift/container-server.conf]/File[/etc/swift/container-server.conf]/ensure: defined content as '{sha256}d818bcada1a4bbf1549cc7b6baa318183401d27e22ae87bf20c105bdbba3854c' Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6000]/Concat[/etc/swift/object-server.conf]/File[/etc/swift/object-server.conf]/ensure: defined content as '{sha256}ec9884acb7b26bc4784ffc31c7679f496187d7890bb4db4431cbf25a49ba470f' Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Proxy/Tripleo::Tls_proxy[swift-proxy-api]/Apache::Vhost[swift-proxy-api-proxy]/Concat[25-swift-proxy-api-proxy.conf]/File[/etc/httpd/conf.d/25-swift-proxy-api-proxy.conf]/ensure: defined content as '{sha256}77ef489750d6bcd1e727d27974e7c8c4b0c71d068d309edebb729fd73a083fc3' Jan 23 09:10:32 np0005593102 puppet-user[68458]: Notice: Applied catalog in 0.64 seconds Jan 23 09:10:32 np0005593102 puppet-user[68458]: Application: Jan 23 09:10:32 np0005593102 puppet-user[68458]: Initial environment: production Jan 23 09:10:32 np0005593102 puppet-user[68458]: Converged environment: production Jan 23 09:10:32 np0005593102 puppet-user[68458]: Run mode: user Jan 23 09:10:32 np0005593102 puppet-user[68458]: Changes: Jan 23 09:10:32 np0005593102 puppet-user[68458]: Total: 163 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Events: Jan 23 09:10:32 np0005593102 puppet-user[68458]: Success: 163 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Total: 163 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Resources: Jan 23 09:10:32 np0005593102 puppet-user[68458]: Changed: 163 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Out of sync: 163 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Skipped: 46 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Total: 330 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Time: Jan 23 09:10:32 np0005593102 puppet-user[68458]: Concat file: 0.00 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Service: 0.00 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Swift config: 0.00 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Concat fragment: 0.00 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Swift object expirer config: 0.02 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Swift keymaster config: 0.02 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Package: 0.03 Jan 23 09:10:32 np0005593102 puppet-user[68458]: File: 0.14 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Swift proxy config: 0.17 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Transaction evaluation: 0.63 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Catalog application: 0.64 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Config retrieval: 1.43 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Last run: 1769159432 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Resources: 0.00 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Total: 0.64 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Version: Jan 23 09:10:32 np0005593102 puppet-user[68458]: Config: 1769159430 Jan 23 09:10:32 np0005593102 puppet-user[68458]: Puppet: 7.10.0 Jan 23 09:10:32 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[account]/Exec[create_account]/returns: executed successfully Jan 23 09:10:32 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[container]/Exec[create_container]/returns: executed successfully Jan 23 09:10:32 np0005593102 puppet-user[68844]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:32 np0005593102 puppet-user[68844]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:32 np0005593102 puppet-user[68844]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Jan 23 09:10:32 np0005593102 systemd[1]: libpod-d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131.scope: Deactivated successfully. Jan 23 09:10:32 np0005593102 systemd[1]: libpod-d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131.scope: Consumed 4.359s CPU time. Jan 23 09:10:32 np0005593102 podman[69110]: 2026-01-23 09:10:32.941644791 +0000 UTC m=+0.034233173 container died d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:12:50Z, container_name=container-puppet-swift, version=17.1.12, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, release=1761123044, name=rhosp17/openstack-swift-proxy-server, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, managed_by=tripleo_ansible, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, distribution-scope=public, url=https://www.redhat.com, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:32 np0005593102 systemd[1]: tmp-crun.TwxTuL.mount: Deactivated successfully. Jan 23 09:10:32 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:32 np0005593102 systemd[1]: var-lib-containers-storage-overlay-003b9af2115e91ab62f749eed0a9aec670ee772e05ed6f1162327c5f7692991e-merged.mount: Deactivated successfully. Jan 23 09:10:33 np0005593102 podman[69110]: 2026-01-23 09:10:33.000505354 +0000 UTC m=+0.093093736 container cleanup d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, architecture=x86_64, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, version=17.1.12, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, io.buildah.version=1.41.4, container_name=container-puppet-swift, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, build-date=2025-11-19T00:12:50Z, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, vcs-type=git, name=rhosp17/openstack-swift-proxy-server) Jan 23 09:10:33 np0005593102 systemd[1]: libpod-conmon-d815782d5c1309e1086ea1f5ee9271261bb97c48b613cec5656d705b08cba131.scope: Deactivated successfully. Jan 23 09:10:33 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift --conmon-pidfile /run/container-puppet-swift.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server --env NAME=swift --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::proxy#012#012class xinetd() {}#012define xinetd::service($bind='',$port='',$server='',$server_args='') {}#012noop_resource('service')#012include tripleo::profile::base::swift::storage --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 09:10:33 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_object_device[172.20.0.103:6000/d1]/ensure: created Jan 23 09:10:33 np0005593102 puppet-user[68844]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:33 np0005593102 puppet-user[68844]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:33 np0005593102 puppet-user[68844]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Jan 23 09:10:33 np0005593102 sshd[69152]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:33 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_container_device[172.20.0.103:6001/d1]/ensure: created Jan 23 09:10:34 np0005593102 puppet-user[68844]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:34 np0005593102 puppet-user[68844]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:34 np0005593102 puppet-user[68844]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Jan 23 09:10:34 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_account_device[172.20.0.103:6002/d1]/ensure: created Jan 23 09:10:34 np0005593102 puppet-user[68844]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:34 np0005593102 puppet-user[68844]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:35 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_object_device[172.20.0.104:6000/d1]/ensure: created Jan 23 09:10:35 np0005593102 puppet-user[68844]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:35 np0005593102 puppet-user[68844]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:35 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_container_device[172.20.0.104:6001/d1]/ensure: created Jan 23 09:10:35 np0005593102 puppet-user[68844]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:35 np0005593102 puppet-user[68844]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:36 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_account_device[172.20.0.104:6002/d1]/ensure: created Jan 23 09:10:36 np0005593102 puppet-user[68844]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:36 np0005593102 puppet-user[68844]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:36 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_object_device[172.20.0.105:6000/d1]/ensure: created Jan 23 09:10:37 np0005593102 puppet-user[68844]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:37 np0005593102 puppet-user[68844]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:37 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_container_device[172.20.0.105:6001/d1]/ensure: created Jan 23 09:10:37 np0005593102 puppet-user[68844]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:37 np0005593102 puppet-user[68844]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:38 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_account_device[172.20.0.105:6002/d1]/ensure: created Jan 23 09:10:38 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[object]/Exec[rebalance_object]: Triggered 'refresh' from 3 events Jan 23 09:10:38 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[account]/Exec[rebalance_account]: Triggered 'refresh' from 3 events Jan 23 09:10:38 np0005593102 sshd[69189]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:39 np0005593102 puppet-user[68844]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[container]/Exec[rebalance_container]: Triggered 'refresh' from 3 events Jan 23 09:10:39 np0005593102 puppet-user[68844]: Notice: Applied catalog in 7.51 seconds Jan 23 09:10:39 np0005593102 puppet-user[68844]: Application: Jan 23 09:10:39 np0005593102 puppet-user[68844]: Initial environment: production Jan 23 09:10:39 np0005593102 puppet-user[68844]: Converged environment: production Jan 23 09:10:39 np0005593102 puppet-user[68844]: Run mode: user Jan 23 09:10:39 np0005593102 puppet-user[68844]: Changes: Jan 23 09:10:39 np0005593102 puppet-user[68844]: Total: 21 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Events: Jan 23 09:10:39 np0005593102 puppet-user[68844]: Success: 21 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Total: 21 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Resources: Jan 23 09:10:39 np0005593102 puppet-user[68844]: Skipped: 16 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Changed: 21 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Out of sync: 21 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Restarted: 3 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Total: 38 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Time: Jan 23 09:10:39 np0005593102 puppet-user[68844]: Swift config: 0.00 Jan 23 09:10:39 np0005593102 puppet-user[68844]: File: 0.00 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Config retrieval: 0.38 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Exec: 0.94 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Ring account device: 1.78 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Ring container device: 1.81 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Ring object device: 1.85 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Last run: 1769159439 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Transaction evaluation: 7.49 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Catalog application: 7.51 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Total: 7.51 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Version: Jan 23 09:10:39 np0005593102 puppet-user[68844]: Config: 1769159431 Jan 23 09:10:39 np0005593102 puppet-user[68844]: Puppet: 7.10.0 Jan 23 09:10:39 np0005593102 systemd[1]: libpod-a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3.scope: Deactivated successfully. Jan 23 09:10:39 np0005593102 systemd[1]: libpod-a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3.scope: Consumed 9.999s CPU time. Jan 23 09:10:39 np0005593102 podman[68694]: 2026-01-23 09:10:39.54140449 +0000 UTC m=+10.547005801 container died a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, version=17.1.12, build-date=2025-11-19T00:12:50Z, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, vcs-type=git, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, release=1761123044, com.redhat.component=openstack-swift-proxy-server-container, tcib_managed=true, container_name=container-puppet-swift_ringbuilder, io.buildah.version=1.41.4, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Jan 23 09:10:39 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:39 np0005593102 systemd[1]: var-lib-containers-storage-overlay-92d3976d1ce0cd16157124922e9e628f178c572ea7f40295d075acf571af6bd7-merged.mount: Deactivated successfully. Jan 23 09:10:39 np0005593102 podman[69227]: 2026-01-23 09:10:39.66551774 +0000 UTC m=+0.110717602 container cleanup a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, managed_by=tripleo_ansible, vcs-type=git, io.buildah.version=1.41.4, tcib_managed=true, vendor=Red Hat, Inc., vcs-ref=954196d89045e2492b9d148629fc509244e8701f, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, version=17.1.12, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-19T00:12:50Z, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, container_name=container-puppet-swift_ringbuilder, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, architecture=x86_64) Jan 23 09:10:39 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:39 np0005593102 systemd[1]: libpod-conmon-a0f9a65084588bbbef38a2a9c9370577052f43abb63237966e2ecfa31f52e4b3.scope: Deactivated successfully. Jan 23 09:10:39 np0005593102 python3[63332]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift_ringbuilder --conmon-pidfile /run/container-puppet-swift_ringbuilder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593102 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball --env NAME=swift_ringbuilder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::ringbuilder#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift_ringbuilder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593102', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift_ringbuilder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 09:10:40 np0005593102 python3[69284]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:41 np0005593102 python3[69316]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:10:42 np0005593102 python3[69366]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:42 np0005593102 python3[69409]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159441.8305063-173357-42405973898947/source dest=/usr/libexec/tripleo-container-shutdown mode=0700 owner=root group=root _original_basename=tripleo-container-shutdown follow=False checksum=7d67b1986212f5548057505748cd74cfcf9c0d35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:43 np0005593102 python3[69471]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:43 np0005593102 python3[69514]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159442.7770839-173357-196494770852514/source dest=/usr/libexec/tripleo-start-podman-container mode=0700 owner=root group=root _original_basename=tripleo-start-podman-container follow=False checksum=536965633b8d3b1ce794269ffb07be0105a560a0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:43 np0005593102 sshd[69574]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:44 np0005593102 python3[69578]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:44 np0005593102 python3[69621]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159443.781962-173405-186590890802623/source dest=/usr/lib/systemd/system/tripleo-container-shutdown.service mode=0644 owner=root group=root _original_basename=tripleo-container-shutdown-service follow=False checksum=66c1d41406ba8714feb9ed0a35259a7a57ef9707 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:45 np0005593102 python3[69683]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:45 np0005593102 python3[69727]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159444.7957911-173429-130377202846586/source dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset mode=0644 owner=root group=root _original_basename=91-tripleo-container-shutdown-preset follow=False checksum=bccb1207dcbcfaa5ca05f83c8f36ce4c2460f081 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:46 np0005593102 python3[69757]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:10:46 np0005593102 systemd[1]: Reloading. Jan 23 09:10:46 np0005593102 systemd-rc-local-generator[69780]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:10:46 np0005593102 systemd-sysv-generator[69784]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:10:46 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:10:46 np0005593102 systemd[1]: Reloading. Jan 23 09:10:46 np0005593102 systemd-rc-local-generator[69824]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:10:46 np0005593102 systemd-sysv-generator[69827]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:10:46 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:10:46 np0005593102 systemd[1]: Starting TripleO Container Shutdown... Jan 23 09:10:46 np0005593102 systemd[1]: Finished TripleO Container Shutdown. Jan 23 09:10:47 np0005593102 python3[69881]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:47 np0005593102 sshd[69909]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:47 np0005593102 python3[69926]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159446.828726-173458-176863260451196/source dest=/usr/lib/systemd/system/netns-placeholder.service mode=0644 owner=root group=root _original_basename=netns-placeholder-service follow=False checksum=8e9c6d5ce3a6e7f71c18780ec899f32f23de4c71 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:48 np0005593102 python3[69988]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:48 np0005593102 python3[70031]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159447.8373-173497-33319169213531/source dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset mode=0644 owner=root group=root _original_basename=91-netns-placeholder-preset follow=False checksum=28b7b9aa893525d134a1eeda8a0a48fb25b736b9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:49 np0005593102 python3[70062]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:10:49 np0005593102 systemd[1]: Reloading. Jan 23 09:10:49 np0005593102 systemd-rc-local-generator[70088]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:10:49 np0005593102 systemd-sysv-generator[70091]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:10:49 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:10:49 np0005593102 systemd[1]: Reloading. Jan 23 09:10:49 np0005593102 systemd-sysv-generator[70125]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:10:49 np0005593102 systemd-rc-local-generator[70120]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:10:49 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:10:49 np0005593102 systemd[1]: Starting Create netns directory... Jan 23 09:10:49 np0005593102 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Jan 23 09:10:49 np0005593102 systemd[1]: netns-placeholder.service: Deactivated successfully. Jan 23 09:10:49 np0005593102 systemd[1]: Finished Create netns directory. Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for memcached, new hash: 244a3d4ccef8b7e455e8c0a562499110 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for metrics_qdr, new hash: 6259ca66732f4bf30abd5685a83e7fc4 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for mysql_bootstrap, new hash: e65b42caec1b92c051e665e491fec913 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for rabbitmq_bootstrap, new hash: 429be7f340f66db5bcda4ab8437e0c82 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for redis_tls_proxy, new hash: 0e22e9f646220ab3a59fa80c6d44b16f Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for clustercheck, new hash: 2c1e5a224c7bf78c9b1af12269ab45a1 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for horizon_fix_perms, new hash: eb3163b58d299e9cab157eb47e909b1d Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for mysql_wait_bundle, new hash: e65b42caec1b92c051e665e491fec913 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_db_sync, new hash: 77799dae8c53c4da3898319593c2f370 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for collectd, new hash: 0a0af6a6a39e15fddd775e0090d092bc Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_db_sync, new hash: f1b3857a502ffec0a119c8fdd6626c50-600a292d2cb88dc400f3720403442f88 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine_db_sync, new hash: 7ef5829e62869bb5b495807b82b3fefd Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for horizon, new hash: eb3163b58d299e9cab157eb47e909b1d Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for iscsid, new hash: 600a292d2cb88dc400f3720403442f88 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for keystone, new hash: 4ed7c5413aa6108d648ecf7b4d7f1ddc Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for keystone_cron, new hash: 4ed7c5413aa6108d648ecf7b4d7f1ddc Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for keystone_db_sync, new hash: 4ed7c5413aa6108d648ecf7b4d7f1ddc Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_db_sync, new hash: dfcc9af7732c93c27b2f3973aa8bb50a Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for neutron_db_sync, new hash: 4a9b1475baf3845cc3b49158264b4347 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_db_sync, new hash: dc3b0bbd3061a4afc61737dfb4683d33 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_ensure_default_cells, new hash: dc3b0bbd3061a4afc61737dfb4683d33 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_db_sync, new hash: dc3b0bbd3061a4afc61737dfb4683d33 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for placement_api_db_sync, new hash: bfed54107a248e2e9a0672499984b64e Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for rsyslog, new hash: 609e09ec60e4adbfe6cf33e4e63e7e73 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_copy_rings, new hash: 61f07ff9b36cc521afd35ebfb4d4c632-ca99129bc6fadc832c60d85da28814e5 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_central, new hash: c0695c36c145ea25d956a7992ebd8202 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_notification, new hash: c0695c36c145ea25d956a7992ebd8202 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api, new hash: 77799dae8c53c4da3898319593c2f370 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_cron, new hash: 77799dae8c53c4da3898319593c2f370 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for cinder_scheduler, new hash: 77799dae8c53c4da3898319593c2f370 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for glance_api, new hash: f1b3857a502ffec0a119c8fdd6626c50-600a292d2cb88dc400f3720403442f88 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_cron, new hash: f1b3857a502ffec0a119c8fdd6626c50 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal, new hash: 29083c9dd1e9bd1df2ec214363f9703a-600a292d2cb88dc400f3720403442f88 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal_tls_proxy, new hash: 29083c9dd1e9bd1df2ec214363f9703a Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_tls_proxy, new hash: f1b3857a502ffec0a119c8fdd6626c50 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for heat_api, new hash: 89a5efa1a180acb8a0dbb9224e4e2435 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cfn, new hash: 85b735e464e3d1c72c7228502133506b Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cron, new hash: 89a5efa1a180acb8a0dbb9224e4e2435 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine, new hash: 7ef5829e62869bb5b495807b82b3fefd Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for logrotate_crond, new hash: 53ed83bb0cae779ff95edb2002262c6f Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for manila_api, new hash: dfcc9af7732c93c27b2f3973aa8bb50a Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_cron, new hash: dfcc9af7732c93c27b2f3973aa8bb50a Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for manila_scheduler, new hash: dfcc9af7732c93c27b2f3973aa8bb50a Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for neutron_api, new hash: 4a9b1475baf3845cc3b49158264b4347 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for neutron_server_tls_proxy, new hash: 4a9b1475baf3845cc3b49158264b4347 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_api, new hash: dc3b0bbd3061a4afc61737dfb4683d33 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_cron, new hash: dc3b0bbd3061a4afc61737dfb4683d33 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_conductor, new hash: dc3b0bbd3061a4afc61737dfb4683d33 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_metadata, new hash: ae505551dc6f1bb30c343372cbe6fdc2 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_scheduler, new hash: dc3b0bbd3061a4afc61737dfb4683d33 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_vnc_proxy, new hash: dc3b0bbd3061a4afc61737dfb4683d33 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for nova_wait_for_api_service, new hash: dc3b0bbd3061a4afc61737dfb4683d33 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for placement_api, new hash: bfed54107a248e2e9a0672499984b64e Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for placement_wait_for_service, new hash: bfed54107a248e2e9a0672499984b64e Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_auditor, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_reaper, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_replicator, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_server, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_auditor, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_replicator, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_server, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_updater, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_auditor, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_expirer, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_replicator, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_server, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_updater, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy_tls_proxy, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 python3[70155]: ansible-container_puppet_config [WARNING] Config change detected for swift_rsync, new hash: 61f07ff9b36cc521afd35ebfb4d4c632 Jan 23 09:10:50 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:50 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:51 np0005593102 python3[70213]: ansible-tripleo_container_manage Invoked with config_id=tripleo_step1 config_dir=/var/lib/tripleo-config/container-startup-config/step_1 config_patterns=*.json config_overrides={} concurrency=5 log_base_path=/var/log/containers/stdouts debug=False Jan 23 09:10:52 np0005593102 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:52 np0005593102 podman[70381]: 2026-01-23 09:10:52.23831136 +0000 UTC m=+0.054644824 container create d64d6c65691b7e43f9d34d4d572356be3d12f362664b9f9dbc4f94631e8e1a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-mariadb, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, io.openshift.expose-services=, release=1761123044, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, build-date=2025-11-18T22:51:13Z, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=mysql_data_ownership, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Jan 23 09:10:52 np0005593102 podman[70383]: 2026-01-23 09:10:52.267719687 +0000 UTC m=+0.081753581 container create 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-memcached-container, release=1761123044, vcs-type=git, build-date=2025-11-18T22:49:49Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_step1, managed_by=tripleo_ansible, version=17.1.12, tcib_managed=true, io.openshift.expose-services=, name=rhosp17/openstack-memcached, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, io.buildah.version=1.41.4, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, container_name=memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:52 np0005593102 systemd[1]: Started libpod-conmon-d64d6c65691b7e43f9d34d4d572356be3d12f362664b9f9dbc4f94631e8e1a3a.scope. Jan 23 09:10:52 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:52 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3321a50bf3f9fb2f6cbda44059c9bfd7be85d5a750f40d80bf081fcceae8dd06/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:52 np0005593102 podman[70384]: 2026-01-23 09:10:52.29313045 +0000 UTC m=+0.103718699 container create 356b961eaec52ef74ce84fb545e9eae5b8995766740c5356a5f1f768f87bde4c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, architecture=x86_64, config_id=tripleo_step1, version=17.1.12, url=https://www.redhat.com, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, vcs-type=git, build-date=2025-11-18T22:49:46Z, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr_init_logs, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}) Jan 23 09:10:52 np0005593102 podman[70389]: 2026-01-23 09:10:52.307380964 +0000 UTC m=+0.108761213 container create 28e39d78aeee427ca14b54f625008236ff2364e50e7c661018803e2b69d3fe16 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, architecture=x86_64, managed_by=tripleo_ansible, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_step1, container_name=rabbitmq_bootstrap, name=rhosp17/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, batch=17.1_20251118.1, io.openshift.expose-services=, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2025-11-18T22:49:50Z, io.buildah.version=1.41.4, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '429be7f340f66db5bcda4ab8437e0c82'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, release=1761123044, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, distribution-scope=public, com.redhat.component=openstack-rabbitmq-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:52 np0005593102 podman[70381]: 2026-01-23 09:10:52.209145633 +0000 UTC m=+0.025479117 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:52 np0005593102 systemd[1]: Started libpod-conmon-6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1.scope. Jan 23 09:10:52 np0005593102 systemd[1]: Started libpod-conmon-356b961eaec52ef74ce84fb545e9eae5b8995766740c5356a5f1f768f87bde4c.scope. Jan 23 09:10:52 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:52 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:52 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/13b6c23938e793eb9760c6d7bbe976f42b418cfc2924b9fd4d0a56aae6786d8a/merged/var/log/memcached supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:52 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/13b6c23938e793eb9760c6d7bbe976f42b418cfc2924b9fd4d0a56aae6786d8a/merged/var/lib/kolla/config_files/src supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:52 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5c2811adba2f99a9a59e211f333fcb0a66218911e038a228cb8036636d38afc2/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:52 np0005593102 podman[70383]: 2026-01-23 09:10:52.234810534 +0000 UTC m=+0.048844428 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 09:10:52 np0005593102 podman[70384]: 2026-01-23 09:10:52.232162643 +0000 UTC m=+0.042750902 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:10:52 np0005593102 systemd[1]: Started libpod-conmon-28e39d78aeee427ca14b54f625008236ff2364e50e7c661018803e2b69d3fe16.scope. Jan 23 09:10:52 np0005593102 podman[70389]: 2026-01-23 09:10:52.242034724 +0000 UTC m=+0.043414983 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 09:10:52 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:52 np0005593102 podman[70384]: 2026-01-23 09:10:52.34596109 +0000 UTC m=+0.156549329 container init 356b961eaec52ef74ce84fb545e9eae5b8995766740c5356a5f1f768f87bde4c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:46Z, version=17.1.12, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, batch=17.1_20251118.1, architecture=x86_64, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, distribution-scope=public, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, url=https://www.redhat.com, managed_by=tripleo_ansible, tcib_managed=true, container_name=metrics_qdr_init_logs, config_id=tripleo_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4) Jan 23 09:10:52 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/bd89f63a268a909eafe1a6419d72aea2423e24d1aae7ae4f92384a6e47f6eb60/merged/var/lib/rabbitmq supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:52 np0005593102 podman[70384]: 2026-01-23 09:10:52.353727666 +0000 UTC m=+0.164315895 container start 356b961eaec52ef74ce84fb545e9eae5b8995766740c5356a5f1f768f87bde4c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=metrics_qdr_init_logs, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:46Z, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, maintainer=OpenStack TripleO Team, release=1761123044, name=rhosp17/openstack-qdrouterd, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-qdrouterd-container, vcs-type=git, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, io.openshift.expose-services=) Jan 23 09:10:52 np0005593102 podman[70384]: 2026-01-23 09:10:52.353904402 +0000 UTC m=+0.164492671 container attach 356b961eaec52ef74ce84fb545e9eae5b8995766740c5356a5f1f768f87bde4c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_step1, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, release=1761123044, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr_init_logs, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:46Z, vcs-type=git, name=rhosp17/openstack-qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd) Jan 23 09:10:52 np0005593102 podman[70389]: 2026-01-23 09:10:52.357974175 +0000 UTC m=+0.159354414 container init 28e39d78aeee427ca14b54f625008236ff2364e50e7c661018803e2b69d3fe16 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, name=rhosp17/openstack-rabbitmq, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, batch=17.1_20251118.1, container_name=rabbitmq_bootstrap, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, url=https://www.redhat.com, com.redhat.component=openstack-rabbitmq-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, build-date=2025-11-18T22:49:50Z, config_id=tripleo_step1, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, managed_by=tripleo_ansible, release=1761123044, distribution-scope=public, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '429be7f340f66db5bcda4ab8437e0c82'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:52 np0005593102 systemd[1]: libpod-356b961eaec52ef74ce84fb545e9eae5b8995766740c5356a5f1f768f87bde4c.scope: Deactivated successfully. Jan 23 09:10:52 np0005593102 podman[70389]: 2026-01-23 09:10:52.364404512 +0000 UTC m=+0.165784751 container start 28e39d78aeee427ca14b54f625008236ff2364e50e7c661018803e2b69d3fe16 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, build-date=2025-11-18T22:49:50Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=rabbitmq_bootstrap, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, config_id=tripleo_step1, tcib_managed=true, distribution-scope=public, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, com.redhat.component=openstack-rabbitmq-container, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '429be7f340f66db5bcda4ab8437e0c82'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, url=https://www.redhat.com, vcs-type=git, name=rhosp17/openstack-rabbitmq, io.openshift.expose-services=) Jan 23 09:10:52 np0005593102 python3[70213]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name rabbitmq_bootstrap --conmon-pidfile /run/rabbitmq_bootstrap.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1769154735 --env TRIPLEO_CONFIG_HASH=429be7f340f66db5bcda4ab8437e0c82 --label config_id=tripleo_step1 --label container_name=rabbitmq_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '429be7f340f66db5bcda4ab8437e0c82'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/rabbitmq_bootstrap.log --network host --privileged=False --user root --volume /var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /var/lib/rabbitmq:/var/lib/rabbitmq:z --volume /etc/puppet:/etc/puppet:ro,z registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 bash -ec kolla_set_configs#012if [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi#012hiera 'rabbitmq::erlang_cookie' > /var/lib/rabbitmq/.erlang.cookie#012chown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie#012chmod 400 /var/lib/rabbitmq/.erlang.cookie Jan 23 09:10:52 np0005593102 podman[70398]: 2026-01-23 09:10:52.290366716 +0000 UTC m=+0.092203309 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 09:10:52 np0005593102 podman[70398]: 2026-01-23 09:10:52.394180358 +0000 UTC m=+0.196016911 container create 9ee1c7c3fffa016f73d691a6da2d0e73f6cb73272d569d7af5cb5089b3e61332 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, io.buildah.version=1.41.4, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, version=17.1.12, description=Red Hat OpenStack Platform 17.1 redis, url=https://www.redhat.com, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=redis_tls_proxy, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0e22e9f646220ab3a59fa80c6d44b16f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, tcib_managed=true, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, build-date=2025-11-18T22:49:49Z, vcs-type=git, com.redhat.component=openstack-redis-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, name=rhosp17/openstack-redis) Jan 23 09:10:52 np0005593102 podman[70381]: 2026-01-23 09:10:52.398287254 +0000 UTC m=+0.214620718 container init d64d6c65691b7e43f9d34d4d572356be3d12f362664b9f9dbc4f94631e8e1a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, name=rhosp17/openstack-mariadb, build-date=2025-11-18T22:51:13Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., config_id=tripleo_step1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_data_ownership, version=17.1.12, batch=17.1_20251118.1, tcib_managed=true, vcs-type=git, url=https://www.redhat.com, distribution-scope=public) Jan 23 09:10:52 np0005593102 podman[70381]: 2026-01-23 09:10:52.409132103 +0000 UTC m=+0.225465567 container start d64d6c65691b7e43f9d34d4d572356be3d12f362664b9f9dbc4f94631e8e1a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., container_name=mysql_data_ownership, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, io.buildah.version=1.41.4, config_id=tripleo_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, name=rhosp17/openstack-mariadb, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, version=17.1.12, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2025-11-18T22:51:13Z, io.openshift.expose-services=, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible) Jan 23 09:10:52 np0005593102 podman[70381]: 2026-01-23 09:10:52.40931639 +0000 UTC m=+0.225649934 container attach d64d6c65691b7e43f9d34d4d572356be3d12f362664b9f9dbc4f94631e8e1a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, com.redhat.component=openstack-mariadb-container, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, build-date=2025-11-18T22:51:13Z, name=rhosp17/openstack-mariadb, distribution-scope=public, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_step1, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, tcib_managed=true, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_data_ownership, version=17.1.12, batch=17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:52 np0005593102 systemd[1]: libpod-d64d6c65691b7e43f9d34d4d572356be3d12f362664b9f9dbc4f94631e8e1a3a.scope: Deactivated successfully. Jan 23 09:10:52 np0005593102 podman[70381]: 2026-01-23 09:10:52.411247548 +0000 UTC m=+0.227581042 container died d64d6c65691b7e43f9d34d4d572356be3d12f362664b9f9dbc4f94631e8e1a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, build-date=2025-11-18T22:51:13Z, version=17.1.12, io.buildah.version=1.41.4, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, container_name=mysql_data_ownership, name=rhosp17/openstack-mariadb, com.redhat.component=openstack-mariadb-container, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=) Jan 23 09:10:52 np0005593102 podman[70465]: 2026-01-23 09:10:52.436134596 +0000 UTC m=+0.061568626 container died 356b961eaec52ef74ce84fb545e9eae5b8995766740c5356a5f1f768f87bde4c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, version=17.1.12, release=1761123044, io.buildah.version=1.41.4, tcib_managed=true, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:46Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=metrics_qdr_init_logs, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, name=rhosp17/openstack-qdrouterd, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, config_id=tripleo_step1) Jan 23 09:10:52 np0005593102 systemd[1]: Started /usr/bin/podman healthcheck run 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1. Jan 23 09:10:52 np0005593102 podman[70383]: 2026-01-23 09:10:52.469789051 +0000 UTC m=+0.283822975 container init 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, summary=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, com.redhat.component=openstack-memcached-container, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:49Z, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, config_id=tripleo_step1, io.buildah.version=1.41.4, batch=17.1_20251118.1, release=1761123044, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, name=rhosp17/openstack-memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, tcib_managed=true, url=https://www.redhat.com, managed_by=tripleo_ansible, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:52 np0005593102 systemd[1]: Started /usr/bin/podman healthcheck run 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1. Jan 23 09:10:52 np0005593102 podman[70383]: 2026-01-23 09:10:52.506298763 +0000 UTC m=+0.320332697 container start 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, managed_by=tripleo_ansible, batch=17.1_20251118.1, distribution-scope=public, com.redhat.component=openstack-memcached-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 memcached, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:52 np0005593102 sshd[70513]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:52 np0005593102 python3[70213]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name memcached --conmon-pidfile /run/memcached.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=244a3d4ccef8b7e455e8c0a562499110 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=memcached --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/memcached.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z --volume /var/log/containers/memcached:/var/log/memcached:rw --volume /etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro --volume /etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 09:10:52 np0005593102 systemd[1]: libpod-28e39d78aeee427ca14b54f625008236ff2364e50e7c661018803e2b69d3fe16.scope: Deactivated successfully. Jan 23 09:10:52 np0005593102 systemd[1]: Started libpod-conmon-9ee1c7c3fffa016f73d691a6da2d0e73f6cb73272d569d7af5cb5089b3e61332.scope. Jan 23 09:10:52 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:52 np0005593102 podman[70512]: 2026-01-23 09:10:52.570841999 +0000 UTC m=+0.062984369 container health_status 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=starting, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., batch=17.1_20251118.1, build-date=2025-11-18T22:49:49Z, description=Red Hat OpenStack Platform 17.1 memcached, release=1761123044, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, version=17.1.12, io.buildah.version=1.41.4, name=rhosp17/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, vcs-type=git, config_id=tripleo_step1, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-memcached-container, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:52 np0005593102 podman[70398]: 2026-01-23 09:10:52.581142693 +0000 UTC m=+0.382979286 container init 9ee1c7c3fffa016f73d691a6da2d0e73f6cb73272d569d7af5cb5089b3e61332 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, config_id=tripleo_step1, vcs-type=git, managed_by=tripleo_ansible, distribution-scope=public, com.redhat.component=openstack-redis-container, tcib_managed=true, name=rhosp17/openstack-redis, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, version=17.1.12, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0e22e9f646220ab3a59fa80c6d44b16f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, release=1761123044, build-date=2025-11-18T22:49:49Z, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, description=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 redis, container_name=redis_tls_proxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1) Jan 23 09:10:52 np0005593102 podman[70398]: 2026-01-23 09:10:52.591331073 +0000 UTC m=+0.393167626 container start 9ee1c7c3fffa016f73d691a6da2d0e73f6cb73272d569d7af5cb5089b3e61332 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, build-date=2025-11-18T22:49:49Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, summary=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.4, version=17.1.12, managed_by=tripleo_ansible, tcib_managed=true, name=rhosp17/openstack-redis, vcs-type=git, url=https://www.redhat.com, container_name=redis_tls_proxy, architecture=x86_64, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-redis-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0e22e9f646220ab3a59fa80c6d44b16f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:52 np0005593102 python3[70213]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name redis_tls_proxy --conmon-pidfile /run/redis_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=0e22e9f646220ab3a59fa80c6d44b16f --label config_id=tripleo_step1 --label container_name=redis_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '0e22e9f646220ab3a59fa80c6d44b16f'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/redis_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro --volume /etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro --volume /var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 09:10:52 np0005593102 podman[70492]: 2026-01-23 09:10:52.684013536 +0000 UTC m=+0.266446127 container cleanup d64d6c65691b7e43f9d34d4d572356be3d12f362664b9f9dbc4f94631e8e1a3a (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, io.buildah.version=1.41.4, config_id=tripleo_step1, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, container_name=mysql_data_ownership, maintainer=OpenStack TripleO Team, release=1761123044, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, build-date=2025-11-18T22:51:13Z, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, io.openshift.expose-services=, version=17.1.12, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible) Jan 23 09:10:52 np0005593102 systemd[1]: libpod-conmon-d64d6c65691b7e43f9d34d4d572356be3d12f362664b9f9dbc4f94631e8e1a3a.scope: Deactivated successfully. Jan 23 09:10:52 np0005593102 podman[70512]: 2026-01-23 09:10:52.688029388 +0000 UTC m=+0.180171738 container exec_died 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, release=1761123044, url=https://www.redhat.com, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.component=openstack-memcached-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=memcached, vcs-type=git, name=rhosp17/openstack-memcached, distribution-scope=public, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_step1, build-date=2025-11-18T22:49:49Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, tcib_managed=true, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}) Jan 23 09:10:52 np0005593102 python3[70213]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_data_ownership --conmon-pidfile /run/mysql_data_ownership.pid --detach=False --label config_id=tripleo_step1 --label container_name=mysql_data_ownership --label managed_by=tripleo_ansible --label config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_data_ownership.log --network host --user root --volume /var/lib/mysql:/var/lib/mysql:z registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 chown -R mysql: /var/lib/mysql Jan 23 09:10:52 np0005593102 systemd[1]: 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1.service: Deactivated successfully. Jan 23 09:10:52 np0005593102 podman[70465]: 2026-01-23 09:10:52.713629358 +0000 UTC m=+0.339063308 container cleanup 356b961eaec52ef74ce84fb545e9eae5b8995766740c5356a5f1f768f87bde4c (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, config_id=tripleo_step1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, container_name=metrics_qdr_init_logs, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, build-date=2025-11-18T22:49:46Z, release=1761123044, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:52 np0005593102 systemd[1]: libpod-conmon-356b961eaec52ef74ce84fb545e9eae5b8995766740c5356a5f1f768f87bde4c.scope: Deactivated successfully. Jan 23 09:10:52 np0005593102 python3[70213]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr_init_logs --conmon-pidfile /run/metrics_qdr_init_logs.pid --detach=False --label config_id=tripleo_step1 --label container_name=metrics_qdr_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 /bin/bash -c chown -R qdrouterd:qdrouterd /var/log/qdrouterd Jan 23 09:10:52 np0005593102 podman[70546]: 2026-01-23 09:10:52.79610243 +0000 UTC m=+0.245781807 container died 28e39d78aeee427ca14b54f625008236ff2364e50e7c661018803e2b69d3fe16 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, io.openshift.expose-services=, com.redhat.component=openstack-rabbitmq-container, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, build-date=2025-11-18T22:49:50Z, summary=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, release=1761123044, description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, container_name=rabbitmq_bootstrap, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, name=rhosp17/openstack-rabbitmq, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '429be7f340f66db5bcda4ab8437e0c82'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, distribution-scope=public, io.buildah.version=1.41.4, vcs-type=git) Jan 23 09:10:52 np0005593102 podman[70546]: 2026-01-23 09:10:52.81352515 +0000 UTC m=+0.263204537 container cleanup 28e39d78aeee427ca14b54f625008236ff2364e50e7c661018803e2b69d3fe16 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '429be7f340f66db5bcda4ab8437e0c82'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, io.openshift.expose-services=, version=17.1.12, batch=17.1_20251118.1, container_name=rabbitmq_bootstrap, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vendor=Red Hat, Inc., url=https://www.redhat.com, managed_by=tripleo_ansible, config_id=tripleo_step1, release=1761123044, name=rhosp17/openstack-rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, com.redhat.component=openstack-rabbitmq-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2025-11-18T22:49:50Z, description=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team) Jan 23 09:10:52 np0005593102 systemd[1]: libpod-conmon-28e39d78aeee427ca14b54f625008236ff2364e50e7c661018803e2b69d3fe16.scope: Deactivated successfully. Jan 23 09:10:53 np0005593102 podman[70760]: 2026-01-23 09:10:53.111364841 +0000 UTC m=+0.057624875 container create d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, architecture=x86_64, release=1761123044, version=17.1.12, managed_by=tripleo_ansible, distribution-scope=public, build-date=2025-11-18T22:49:46Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '6259ca66732f4bf30abd5685a83e7fc4'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, container_name=metrics_qdr, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, name=rhosp17/openstack-qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd) Jan 23 09:10:53 np0005593102 podman[70752]: 2026-01-23 09:10:53.138191679 +0000 UTC m=+0.095380156 container create 226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, build-date=2025-11-18T22:51:13Z, architecture=x86_64, config_id=tripleo_step1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20251118.1, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e65b42caec1b92c051e665e491fec913'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, container_name=mysql_bootstrap, url=https://www.redhat.com, managed_by=tripleo_ansible, name=rhosp17/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, version=17.1.12, io.buildah.version=1.41.4, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., tcib_managed=true) Jan 23 09:10:53 np0005593102 systemd[1]: Started libpod-conmon-d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2.scope. Jan 23 09:10:53 np0005593102 systemd[1]: Started libpod-conmon-226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3.scope. Jan 23 09:10:53 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:53 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fe22993a327d5e68ef292802a32b6cbdcda54b2d79c6c3dce9c86b838706998f/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:53 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fe22993a327d5e68ef292802a32b6cbdcda54b2d79c6c3dce9c86b838706998f/merged/var/lib/qdrouterd supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:53 np0005593102 systemd[1]: Started libcrun container. Jan 23 09:10:53 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d28515c60ad0b7fdd43dc494083e51d4d7b087264eb0ee325d091310a54370fa/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:53 np0005593102 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d28515c60ad0b7fdd43dc494083e51d4d7b087264eb0ee325d091310a54370fa/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:53 np0005593102 podman[70760]: 2026-01-23 09:10:53.081420239 +0000 UTC m=+0.027680283 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:10:53 np0005593102 podman[70752]: 2026-01-23 09:10:53.088514646 +0000 UTC m=+0.045703183 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:53 np0005593102 systemd[1]: Started /usr/bin/podman healthcheck run d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2. Jan 23 09:10:53 np0005593102 podman[70760]: 2026-01-23 09:10:53.195240736 +0000 UTC m=+0.141500790 container init d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=metrics_qdr, config_id=tripleo_step1, com.redhat.component=openstack-qdrouterd-container, release=1761123044, tcib_managed=true, distribution-scope=public, maintainer=OpenStack TripleO Team, architecture=x86_64, managed_by=tripleo_ansible, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., name=rhosp17/openstack-qdrouterd, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '6259ca66732f4bf30abd5685a83e7fc4'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, build-date=2025-11-18T22:49:46Z, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=) Jan 23 09:10:53 np0005593102 systemd[1]: Started /usr/bin/podman healthcheck run d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2. Jan 23 09:10:53 np0005593102 podman[70760]: 2026-01-23 09:10:53.218594257 +0000 UTC m=+0.164854291 container start d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, name=rhosp17/openstack-qdrouterd, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, description=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, vcs-type=git, com.redhat.component=openstack-qdrouterd-container, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, tcib_managed=true, build-date=2025-11-18T22:49:46Z, io.openshift.expose-services=, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, distribution-scope=public, container_name=metrics_qdr, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '6259ca66732f4bf30abd5685a83e7fc4'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, managed_by=tripleo_ansible) Jan 23 09:10:53 np0005593102 python3[70213]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr --conmon-pidfile /run/metrics_qdr.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=6259ca66732f4bf30abd5685a83e7fc4 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=metrics_qdr --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '6259ca66732f4bf30abd5685a83e7fc4'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr.log --network host --privileged=False --user qdrouterd --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro --volume /var/lib/metrics_qdr:/var/lib/qdrouterd:z --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z --volume /etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro --volume /etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:10:53 np0005593102 podman[70752]: 2026-01-23 09:10:53.235936256 +0000 UTC m=+0.193124733 container init 226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, container_name=mysql_bootstrap, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e65b42caec1b92c051e665e491fec913'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, build-date=2025-11-18T22:51:13Z, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, distribution-scope=public, version=17.1.12, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, name=rhosp17/openstack-mariadb, vcs-type=git, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com) Jan 23 09:10:53 np0005593102 podman[70752]: 2026-01-23 09:10:53.24365456 +0000 UTC m=+0.200843027 container start 226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, release=1761123044, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, managed_by=tripleo_ansible, version=17.1.12, build-date=2025-11-18T22:51:13Z, io.buildah.version=1.41.4, com.redhat.component=openstack-mariadb-container, container_name=mysql_bootstrap, config_id=tripleo_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, distribution-scope=public, io.openshift.expose-services=, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e65b42caec1b92c051e665e491fec913'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}) Jan 23 09:10:53 np0005593102 podman[70752]: 2026-01-23 09:10:53.243947619 +0000 UTC m=+0.201136096 container attach 226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=mysql_bootstrap, summary=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, architecture=x86_64, managed_by=tripleo_ansible, build-date=2025-11-18T22:51:13Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, io.openshift.expose-services=, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e65b42caec1b92c051e665e491fec913'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, distribution-scope=public, com.redhat.component=openstack-mariadb-container, release=1761123044, vendor=Red Hat, Inc., vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb) Jan 23 09:10:53 np0005593102 podman[70792]: 2026-01-23 09:10:53.343252344 +0000 UTC m=+0.119911923 container health_status d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=starting, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '6259ca66732f4bf30abd5685a83e7fc4'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=, io.buildah.version=1.41.4, url=https://www.redhat.com, distribution-scope=public, build-date=2025-11-18T22:49:46Z, managed_by=tripleo_ansible) Jan 23 09:10:53 np0005593102 podman[70792]: 2026-01-23 09:10:53.523512864 +0000 UTC m=+0.300172443 container exec_died d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, distribution-scope=public, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.buildah.version=1.41.4, build-date=2025-11-18T22:49:46Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '6259ca66732f4bf30abd5685a83e7fc4'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, architecture=x86_64, container_name=metrics_qdr, com.redhat.component=openstack-qdrouterd-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, version=17.1.12, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git) Jan 23 09:10:53 np0005593102 systemd[1]: d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2.service: Deactivated successfully. Jan 23 09:10:53 np0005593102 sshd[70909]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:57 np0005593102 sshd[71583]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:10:59 np0005593102 systemd[1]: libpod-226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3.scope: Deactivated successfully. Jan 23 09:10:59 np0005593102 systemd[1]: libpod-226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3.scope: Consumed 2.201s CPU time. Jan 23 09:10:59 np0005593102 podman[70752]: 2026-01-23 09:10:59.049645683 +0000 UTC m=+6.006834200 container died 226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, distribution-scope=public, name=rhosp17/openstack-mariadb, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e65b42caec1b92c051e665e491fec913'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, build-date=2025-11-18T22:51:13Z, com.redhat.component=openstack-mariadb-container, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, io.openshift.expose-services=, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, version=17.1.12, url=https://www.redhat.com, vcs-type=git, release=1761123044, container_name=mysql_bootstrap, config_id=tripleo_step1, vendor=Red Hat, Inc.) Jan 23 09:10:59 np0005593102 systemd[1]: tmp-crun.FlzaAL.mount: Deactivated successfully. Jan 23 09:10:59 np0005593102 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:59 np0005593102 systemd[1]: var-lib-containers-storage-overlay-d28515c60ad0b7fdd43dc494083e51d4d7b087264eb0ee325d091310a54370fa-merged.mount: Deactivated successfully. Jan 23 09:10:59 np0005593102 podman[71599]: 2026-01-23 09:10:59.153834056 +0000 UTC m=+0.092238710 container cleanup 226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, batch=17.1_20251118.1, url=https://www.redhat.com, architecture=x86_64, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_id=tripleo_step1, release=1761123044, description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, version=17.1.12, container_name=mysql_bootstrap, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e65b42caec1b92c051e665e491fec913'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-mariadb-container, managed_by=tripleo_ansible, name=rhosp17/openstack-mariadb) Jan 23 09:10:59 np0005593102 systemd[1]: libpod-conmon-226647d21abea83a9da0894796f74d5a1feec43b8b1e167c2eb5ec8b45c72de3.scope: Deactivated successfully. Jan 23 09:10:59 np0005593102 python3[70213]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_bootstrap --conmon-pidfile /run/mysql_bootstrap.pid --detach=False --env DB_MARIABACKUP_PASSWORD=8vXb4IKKnGGsuu5CBm6O5o27n --env DB_MARIABACKUP_USER=mariabackup --env DB_MAX_TIMEOUT=60 --env KOLLA_BOOTSTRAP=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=e65b42caec1b92c051e665e491fec913 --label config_id=tripleo_step1 --label container_name=mysql_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e65b42caec1b92c051e665e491fec913'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_bootstrap.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z --volume /var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z --volume /var/lib/mysql:/var/lib/mysql:rw,z --volume /etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro --volume /etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 bash -ec if [ -e /var/lib/mysql/mysql ]; then exit 0; fi#012echo -e "\n[mysqld]\nwsrep_provider=none" >> /etc/my.cnf#012export DB_ROOT_PASSWORD=$(hiera 'mysql::server::root_password')#012kolla_set_configs#012sudo -u mysql -E kolla_extend_start#012timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done'#012mysqld_safe --skip-networking --wsrep-on=OFF timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'until mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" ping 2>/dev/null; do sleep 1; done'#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "CREATE USER 'clustercheck'@'localhost' IDENTIFIED BY '$(hiera mysql_clustercheck_password)';"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "GRANT PROCESS ON *.* TO 'clustercheck'@'localhost' WITH GRANT OPTION;"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "DELETE FROM mysql.user WHERE user = 'root' AND host NOT IN ('%','localhost');"#012timeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" shutdown Jan 23 09:10:59 np0005593102 python3[71654]: ansible-file Invoked with path=/etc/systemd/system/tripleo_memcached.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:59 np0005593102 python3[71670]: ansible-file Invoked with path=/etc/systemd/system/tripleo_metrics_qdr.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:00 np0005593102 python3[71686]: ansible-file Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:00 np0005593102 python3[71702]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_memcached_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:11:00 np0005593102 python3[71718]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_metrics_qdr_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:11:00 np0005593102 python3[71734]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:11:01 np0005593102 python3[71795]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159461.0707238-173967-141222258646958/source dest=/etc/systemd/system/tripleo_memcached.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:02 np0005593102 python3[71824]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159461.0707238-173967-141222258646958/source dest=/etc/systemd/system/tripleo_metrics_qdr.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:02 np0005593102 python3[71853]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159461.0707238-173967-141222258646958/source dest=/etc/systemd/system/tripleo_redis_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:02 np0005593102 sshd[71870]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:03 np0005593102 python3[71869]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Jan 23 09:11:03 np0005593102 systemd[1]: Reloading. Jan 23 09:11:03 np0005593102 systemd-rc-local-generator[71894]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:11:03 np0005593102 systemd-sysv-generator[71898]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:11:03 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:11:04 np0005593102 python3[71923]: ansible-systemd Invoked with state=restarted name=tripleo_memcached.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:11:04 np0005593102 systemd[1]: Reloading. Jan 23 09:11:04 np0005593102 systemd-rc-local-generator[71954]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:11:04 np0005593102 systemd-sysv-generator[71958]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:11:04 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:11:04 np0005593102 systemd[1]: Starting memcached container... Jan 23 09:11:04 np0005593102 systemd[1]: Started memcached container. Jan 23 09:11:06 np0005593102 python3[71990]: ansible-systemd Invoked with state=restarted name=tripleo_metrics_qdr.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:11:06 np0005593102 systemd[1]: Reloading. Jan 23 09:11:06 np0005593102 systemd-rc-local-generator[72017]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:11:06 np0005593102 systemd-sysv-generator[72024]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:11:06 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:11:06 np0005593102 systemd[1]: Starting metrics_qdr container... Jan 23 09:11:06 np0005593102 systemd[1]: Started metrics_qdr container. Jan 23 09:11:07 np0005593102 python3[72060]: ansible-systemd Invoked with state=restarted name=tripleo_redis_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:11:07 np0005593102 systemd[1]: Reloading. Jan 23 09:11:07 np0005593102 systemd-rc-local-generator[72085]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:11:07 np0005593102 systemd-sysv-generator[72088]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:11:07 np0005593102 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:11:07 np0005593102 systemd[1]: Starting redis_tls_proxy container... Jan 23 09:11:07 np0005593102 systemd[1]: Started redis_tls_proxy container. Jan 23 09:11:07 np0005593102 sshd[72111]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:08 np0005593102 python3[72142]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks1.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:10 np0005593102 python3[72264]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks1.json short_hostname=np0005593102 step=1 update_config_hash_only=False Jan 23 09:11:10 np0005593102 python3[72280]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:10 np0005593102 python3[72296]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Jan 23 09:11:13 np0005593102 sshd[72297]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:18 np0005593102 sshd[72300]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:23 np0005593102 systemd[1]: Started /usr/bin/podman healthcheck run 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1. Jan 23 09:11:23 np0005593102 systemd[1]: tmp-crun.9kwNUw.mount: Deactivated successfully. Jan 23 09:11:23 np0005593102 podman[72303]: 2026-01-23 09:11:23.277568803 +0000 UTC m=+0.099600904 container health_status 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20251118.1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, release=1761123044, tcib_managed=true, name=rhosp17/openstack-memcached, config_id=tripleo_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, container_name=memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-memcached-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-type=git) Jan 23 09:11:23 np0005593102 podman[72303]: 2026-01-23 09:11:23.321199703 +0000 UTC m=+0.143231824 container exec_died 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.4, batch=17.1_20251118.1, config_id=tripleo_step1, container_name=memcached, release=1761123044, vendor=Red Hat, Inc., name=rhosp17/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.12, build-date=2025-11-18T22:49:49Z, description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '244a3d4ccef8b7e455e8c0a562499110'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, com.redhat.component=openstack-memcached-container) Jan 23 09:11:23 np0005593102 systemd[1]: 6f4528bde8b41972aa09c5c8610b3ff8d35b2e4c2629283c4a7fb5b39bf9a9a1.service: Deactivated successfully. Jan 23 09:11:23 np0005593102 sshd[72323]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:24 np0005593102 systemd[1]: Started /usr/bin/podman healthcheck run d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2. Jan 23 09:11:24 np0005593102 podman[72325]: 2026-01-23 09:11:24.253702595 +0000 UTC m=+0.077753630 container health_status d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '6259ca66732f4bf30abd5685a83e7fc4'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, com.redhat.component=openstack-qdrouterd-container, build-date=2025-11-18T22:49:46Z, config_id=tripleo_step1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.openshift.expose-services=, name=rhosp17/openstack-qdrouterd, release=1761123044, vcs-type=git, url=https://www.redhat.com, vendor=Red Hat, Inc., architecture=x86_64, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Jan 23 09:11:24 np0005593102 podman[72325]: 2026-01-23 09:11:24.479251414 +0000 UTC m=+0.303302399 container exec_died d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, description=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=metrics_qdr, io.openshift.expose-services=, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '6259ca66732f4bf30abd5685a83e7fc4'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, maintainer=OpenStack TripleO Team, release=1761123044, batch=17.1_20251118.1, config_id=tripleo_step1, build-date=2025-11-18T22:49:46Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, version=17.1.12, distribution-scope=public, io.buildah.version=1.41.4, vendor=Red Hat, Inc., managed_by=tripleo_ansible, url=https://www.redhat.com, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:11:24 np0005593102 systemd[1]: d7e458f13fabb12635cd2d3db3e1eed5d040d5d6e1ced17d60272dfd919a04a2.service: Deactivated successfully. Jan 23 09:11:28 np0005593102 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:4c:0f:bd MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.246 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=36144 DF PROTO=TCP SPT=58228 DPT=19885 SEQ=1242972739 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080AC5DDB1920000000001030307) Jan 23 09:11:28 np0005593102 sshd[72355]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:28 np0005593102 systemd[1]: Starting User Manager for UID 1000... Jan 23 09:11:28 np0005593102 systemd-logind[36347]: New session 17 of user zuul. Jan 23 09:11:28 np0005593102 systemd[72359]: Queued start job for default target Main User Target. Jan 23 09:11:28 np0005593102 systemd[72359]: Created slice User Application Slice. Jan 23 09:11:28 np0005593102 systemd[72359]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 09:11:28 np0005593102 systemd[72359]: Started Daily Cleanup of User's Temporary Directories. Jan 23 09:11:28 np0005593102 systemd[72359]: Reached target Paths. Jan 23 09:11:28 np0005593102 systemd[72359]: Reached target Timers. Jan 23 09:11:28 np0005593102 systemd[72359]: Starting D-Bus User Message Bus Socket... Jan 23 09:11:28 np0005593102 systemd[72359]: Starting Create User's Volatile Files and Directories... Jan 23 09:11:28 np0005593102 systemd[72359]: Finished Create User's Volatile Files and Directories. Jan 23 09:11:28 np0005593102 systemd[72359]: Listening on D-Bus User Message Bus Socket. Jan 23 09:11:28 np0005593102 systemd[72359]: Reached target Sockets. Jan 23 09:11:28 np0005593102 systemd[72359]: Reached target Basic System. Jan 23 09:11:28 np0005593102 systemd[72359]: Reached target Main User Target. Jan 23 09:11:28 np0005593102 systemd[72359]: Startup finished in 94ms. Jan 23 09:11:28 np0005593102 systemd[1]: Started User Manager for UID 1000. Jan 23 09:11:28 np0005593102 sshd[72374]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:28 np0005593102 systemd[1]: Started Session 17 of User zuul. Jan 23 09:11:28 np0005593102 python3[72392]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-8619-8585-00000000000c-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 09:11:29 np0005593102 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:4c:0f:bd MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.246 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=36145 DF PROTO=TCP SPT=58228 DPT=19885 SEQ=1242972739 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080AC5DDB5B10000000001030307) Jan 23 09:11:29 np0005593102 subscription-manager[72393]: Unregistered machine with identity: 50b82dcf-92cb-4e59-8285-b2a50e8461d9 Jan 23 09:11:31 np0005593102 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:4c:0f:bd MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.246 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=36146 DF PROTO=TCP SPT=58228 DPT=19885 SEQ=1242972739 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080AC5DDBDB10000000001030307) Jan 23 09:11:32 np0005593102 sshd[72396]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:34 np0005593102 systemd[1]: session-17.scope: Deactivated successfully. Jan 23 09:11:34 np0005593102 systemd-logind[36347]: Session 17 logged out. Waiting for processes to exit. Jan 23 09:11:34 np0005593102 systemd-logind[36347]: Removed session 17. Jan 23 09:11:37 np0005593102 sshd[72398]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:40 np0005593102 sshd[72400]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:44 np0005593102 sshd[72402]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:44 np0005593102 systemd[1]: Stopping User Manager for UID 1000... Jan 23 09:11:44 np0005593102 systemd[72359]: Activating special unit Exit the Session... Jan 23 09:11:44 np0005593102 systemd[72359]: Stopped target Main User Target. Jan 23 09:11:44 np0005593102 systemd[72359]: Stopped target Basic System. Jan 23 09:11:44 np0005593102 systemd[72359]: Stopped target Paths. Jan 23 09:11:44 np0005593102 systemd[72359]: Stopped target Sockets. Jan 23 09:11:44 np0005593102 systemd[72359]: Stopped target Timers. Jan 23 09:11:44 np0005593102 systemd[72359]: Stopped Mark boot as successful after the user session has run 2 minutes. Jan 23 09:11:44 np0005593102 systemd[72359]: Stopped Daily Cleanup of User's Temporary Directories. Jan 23 09:11:44 np0005593102 systemd[72359]: Closed D-Bus User Message Bus Socket. Jan 23 09:11:44 np0005593102 systemd[72359]: Stopped Create User's Volatile Files and Directories. Jan 23 09:11:44 np0005593102 systemd[72359]: Removed slice User Application Slice. Jan 23 09:11:44 np0005593102 systemd[72359]: Reached target Shutdown. Jan 23 09:11:44 np0005593102 systemd[72359]: Finished Exit the Session. Jan 23 09:11:44 np0005593102 systemd[72359]: Reached target Exit the Session. Jan 23 09:11:44 np0005593102 systemd[1]: user@1000.service: Deactivated successfully. Jan 23 09:11:44 np0005593102 systemd[1]: Stopped User Manager for UID 1000. Jan 23 09:11:46 np0005593102 sshd[72404]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:46 np0005593102 systemd[1]: Starting User Manager for UID 1000... Jan 23 09:11:46 np0005593102 systemd-logind[36347]: New session 19 of user zuul. Jan 23 09:11:46 np0005593102 systemd[72408]: Queued start job for default target Main User Target. Jan 23 09:11:46 np0005593102 systemd[72408]: Created slice User Application Slice. Jan 23 09:11:46 np0005593102 systemd[72408]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 09:11:46 np0005593102 systemd[72408]: Started Daily Cleanup of User's Temporary Directories. Jan 23 09:11:46 np0005593102 systemd[72408]: Reached target Paths. Jan 23 09:11:46 np0005593102 systemd[72408]: Reached target Timers. Jan 23 09:11:46 np0005593102 systemd[72408]: Starting D-Bus User Message Bus Socket... Jan 23 09:11:46 np0005593102 systemd[72408]: Starting Create User's Volatile Files and Directories... Jan 23 09:11:46 np0005593102 systemd[72408]: Listening on D-Bus User Message Bus Socket. Jan 23 09:11:46 np0005593102 systemd[72408]: Finished Create User's Volatile Files and Directories. Jan 23 09:11:46 np0005593102 systemd[72408]: Reached target Sockets. Jan 23 09:11:46 np0005593102 systemd[72408]: Reached target Basic System. Jan 23 09:11:46 np0005593102 systemd[72408]: Reached target Main User Target. Jan 23 09:11:46 np0005593102 systemd[72408]: Startup finished in 75ms. Jan 23 09:11:46 np0005593102 systemd[1]: Started User Manager for UID 1000. Jan 23 09:11:46 np0005593102 systemd[1]: Started Session 19 of User zuul.