Jan 23 01:45:20 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Jan 23 01:45:20 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Jan 23 01:45:20 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Jan 23 01:45:20 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 23 01:45:20 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 23 01:45:20 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 23 01:45:20 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 23 01:45:20 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jan 23 01:45:20 localhost kernel: signal: max sigframe size: 1776 Jan 23 01:45:20 localhost kernel: BIOS-provided physical RAM map: Jan 23 01:45:20 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 23 01:45:20 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 23 01:45:20 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 23 01:45:20 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Jan 23 01:45:20 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Jan 23 01:45:20 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 23 01:45:20 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 23 01:45:20 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Jan 23 01:45:20 localhost kernel: NX (Execute Disable) protection: active Jan 23 01:45:20 localhost kernel: SMBIOS 2.8 present. Jan 23 01:45:20 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Jan 23 01:45:20 localhost kernel: Hypervisor detected: KVM Jan 23 01:45:20 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 23 01:45:20 localhost kernel: kvm-clock: using sched offset of 1962574831 cycles Jan 23 01:45:20 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 23 01:45:20 localhost kernel: tsc: Detected 2799.998 MHz processor Jan 23 01:45:20 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Jan 23 01:45:20 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 23 01:45:20 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Jan 23 01:45:20 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Jan 23 01:45:20 localhost kernel: Using GB pages for direct mapping Jan 23 01:45:20 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Jan 23 01:45:20 localhost kernel: ACPI: Early table checksum verification disabled Jan 23 01:45:20 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Jan 23 01:45:20 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:20 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:20 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:20 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Jan 23 01:45:20 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:20 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:20 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Jan 23 01:45:20 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Jan 23 01:45:20 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Jan 23 01:45:20 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Jan 23 01:45:20 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Jan 23 01:45:20 localhost kernel: No NUMA configuration found Jan 23 01:45:20 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Jan 23 01:45:20 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd5000-0x43fffffff] Jan 23 01:45:20 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Jan 23 01:45:20 localhost kernel: Zone ranges: Jan 23 01:45:20 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 23 01:45:20 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jan 23 01:45:20 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Jan 23 01:45:20 localhost kernel: Device empty Jan 23 01:45:20 localhost kernel: Movable zone start for each node Jan 23 01:45:20 localhost kernel: Early memory node ranges Jan 23 01:45:20 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 23 01:45:20 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Jan 23 01:45:20 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Jan 23 01:45:20 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Jan 23 01:45:20 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 23 01:45:20 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 23 01:45:20 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Jan 23 01:45:20 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Jan 23 01:45:20 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 23 01:45:20 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 23 01:45:20 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 23 01:45:20 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 23 01:45:20 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 23 01:45:20 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 23 01:45:20 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 23 01:45:20 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jan 23 01:45:20 localhost kernel: TSC deadline timer available Jan 23 01:45:20 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Jan 23 01:45:20 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Jan 23 01:45:20 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Jan 23 01:45:20 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Jan 23 01:45:20 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Jan 23 01:45:20 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Jan 23 01:45:20 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Jan 23 01:45:20 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Jan 23 01:45:20 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Jan 23 01:45:20 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Jan 23 01:45:20 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Jan 23 01:45:20 localhost kernel: Booting paravirtualized kernel on KVM Jan 23 01:45:20 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 23 01:45:20 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Jan 23 01:45:20 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Jan 23 01:45:20 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Jan 23 01:45:20 localhost kernel: Fallback order for Node 0: 0 Jan 23 01:45:20 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Jan 23 01:45:20 localhost kernel: Policy zone: Normal Jan 23 01:45:20 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Jan 23 01:45:20 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Jan 23 01:45:20 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Jan 23 01:45:20 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jan 23 01:45:20 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 23 01:45:20 localhost kernel: software IO TLB: area num 8. Jan 23 01:45:20 localhost kernel: Memory: 2873456K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741260K reserved, 0K cma-reserved) Jan 23 01:45:20 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Jan 23 01:45:20 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Jan 23 01:45:20 localhost kernel: ftrace: allocating 44803 entries in 176 pages Jan 23 01:45:20 localhost kernel: ftrace: allocated 176 pages with 3 groups Jan 23 01:45:20 localhost kernel: Dynamic Preempt: voluntary Jan 23 01:45:20 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Jan 23 01:45:20 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Jan 23 01:45:20 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Jan 23 01:45:20 localhost kernel: #011Rude variant of Tasks RCU enabled. Jan 23 01:45:20 localhost kernel: #011Tracing variant of Tasks RCU enabled. Jan 23 01:45:20 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 23 01:45:20 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Jan 23 01:45:20 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Jan 23 01:45:20 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jan 23 01:45:20 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Jan 23 01:45:20 localhost kernel: random: crng init done (trusting CPU's manufacturer) Jan 23 01:45:20 localhost kernel: Console: colour VGA+ 80x25 Jan 23 01:45:20 localhost kernel: printk: console [tty0] enabled Jan 23 01:45:20 localhost kernel: printk: console [ttyS0] enabled Jan 23 01:45:20 localhost kernel: ACPI: Core revision 20211217 Jan 23 01:45:20 localhost kernel: APIC: Switch to symmetric I/O mode setup Jan 23 01:45:20 localhost kernel: x2apic enabled Jan 23 01:45:20 localhost kernel: Switched APIC routing to physical x2apic. Jan 23 01:45:20 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 23 01:45:20 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Jan 23 01:45:20 localhost kernel: pid_max: default: 32768 minimum: 301 Jan 23 01:45:20 localhost kernel: LSM: Security Framework initializing Jan 23 01:45:20 localhost kernel: Yama: becoming mindful. Jan 23 01:45:20 localhost kernel: SELinux: Initializing. Jan 23 01:45:20 localhost kernel: LSM support for eBPF active Jan 23 01:45:20 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 23 01:45:20 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 23 01:45:20 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 23 01:45:20 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 23 01:45:20 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 23 01:45:20 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 23 01:45:20 localhost kernel: Spectre V2 : Mitigation: Retpolines Jan 23 01:45:20 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jan 23 01:45:20 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jan 23 01:45:20 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jan 23 01:45:20 localhost kernel: RETBleed: Mitigation: untrained return thunk Jan 23 01:45:20 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jan 23 01:45:20 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Jan 23 01:45:20 localhost kernel: Freeing SMP alternatives memory: 36K Jan 23 01:45:20 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Jan 23 01:45:20 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Jan 23 01:45:20 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Jan 23 01:45:20 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Jan 23 01:45:20 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Jan 23 01:45:20 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jan 23 01:45:20 localhost kernel: ... version: 0 Jan 23 01:45:20 localhost kernel: ... bit width: 48 Jan 23 01:45:20 localhost kernel: ... generic registers: 6 Jan 23 01:45:20 localhost kernel: ... value mask: 0000ffffffffffff Jan 23 01:45:20 localhost kernel: ... max period: 00007fffffffffff Jan 23 01:45:20 localhost kernel: ... fixed-purpose events: 0 Jan 23 01:45:20 localhost kernel: ... event mask: 000000000000003f Jan 23 01:45:20 localhost kernel: rcu: Hierarchical SRCU implementation. Jan 23 01:45:20 localhost kernel: rcu: #011Max phase no-delay instances is 400. Jan 23 01:45:20 localhost kernel: smp: Bringing up secondary CPUs ... Jan 23 01:45:20 localhost kernel: x86: Booting SMP configuration: Jan 23 01:45:20 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Jan 23 01:45:20 localhost kernel: smp: Brought up 1 node, 8 CPUs Jan 23 01:45:20 localhost kernel: smpboot: Max logical packages: 8 Jan 23 01:45:20 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Jan 23 01:45:20 localhost kernel: node 0 deferred pages initialised in 22ms Jan 23 01:45:20 localhost kernel: devtmpfs: initialized Jan 23 01:45:20 localhost kernel: x86/mm: Memory block size: 128MB Jan 23 01:45:20 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 23 01:45:20 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Jan 23 01:45:20 localhost kernel: pinctrl core: initialized pinctrl subsystem Jan 23 01:45:20 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jan 23 01:45:20 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Jan 23 01:45:20 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jan 23 01:45:20 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jan 23 01:45:20 localhost kernel: audit: initializing netlink subsys (disabled) Jan 23 01:45:20 localhost kernel: audit: type=2000 audit(1769150719.178:1): state=initialized audit_enabled=0 res=1 Jan 23 01:45:20 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Jan 23 01:45:20 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 23 01:45:20 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Jan 23 01:45:20 localhost kernel: cpuidle: using governor menu Jan 23 01:45:20 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Jan 23 01:45:20 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 23 01:45:20 localhost kernel: PCI: Using configuration type 1 for base access Jan 23 01:45:20 localhost kernel: PCI: Using configuration type 1 for extended access Jan 23 01:45:20 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jan 23 01:45:20 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Jan 23 01:45:20 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jan 23 01:45:20 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jan 23 01:45:20 localhost kernel: cryptd: max_cpu_qlen set to 1000 Jan 23 01:45:20 localhost kernel: ACPI: Added _OSI(Module Device) Jan 23 01:45:20 localhost kernel: ACPI: Added _OSI(Processor Device) Jan 23 01:45:20 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jan 23 01:45:20 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 23 01:45:20 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Jan 23 01:45:20 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jan 23 01:45:20 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jan 23 01:45:20 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 23 01:45:20 localhost kernel: ACPI: Interpreter enabled Jan 23 01:45:20 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Jan 23 01:45:20 localhost kernel: ACPI: Using IOAPIC for interrupt routing Jan 23 01:45:20 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 23 01:45:20 localhost kernel: PCI: Using E820 reservations for host bridge windows Jan 23 01:45:20 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jan 23 01:45:20 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 23 01:45:20 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Jan 23 01:45:20 localhost kernel: acpiphp: Slot [3] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [4] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [5] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [6] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [7] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [8] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [9] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [10] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [11] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [12] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [13] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [14] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [15] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [16] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [17] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [18] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [19] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [20] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [21] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [22] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [23] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [24] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [25] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [26] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [27] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [28] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [29] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [30] registered Jan 23 01:45:20 localhost kernel: acpiphp: Slot [31] registered Jan 23 01:45:20 localhost kernel: PCI host bridge to bus 0000:00 Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 23 01:45:20 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jan 23 01:45:20 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jan 23 01:45:20 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Jan 23 01:45:20 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Jan 23 01:45:20 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jan 23 01:45:20 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jan 23 01:45:20 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jan 23 01:45:20 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jan 23 01:45:20 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Jan 23 01:45:20 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Jan 23 01:45:20 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jan 23 01:45:20 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jan 23 01:45:20 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jan 23 01:45:20 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Jan 23 01:45:20 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Jan 23 01:45:20 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Jan 23 01:45:20 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Jan 23 01:45:20 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Jan 23 01:45:20 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 23 01:45:20 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jan 23 01:45:20 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Jan 23 01:45:20 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Jan 23 01:45:20 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Jan 23 01:45:20 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Jan 23 01:45:20 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jan 23 01:45:20 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jan 23 01:45:20 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Jan 23 01:45:20 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Jan 23 01:45:20 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Jan 23 01:45:20 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Jan 23 01:45:20 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Jan 23 01:45:20 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Jan 23 01:45:20 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Jan 23 01:45:20 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Jan 23 01:45:20 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jan 23 01:45:20 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jan 23 01:45:20 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jan 23 01:45:20 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jan 23 01:45:20 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jan 23 01:45:20 localhost kernel: iommu: Default domain type: Translated Jan 23 01:45:20 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jan 23 01:45:20 localhost kernel: SCSI subsystem initialized Jan 23 01:45:20 localhost kernel: ACPI: bus type USB registered Jan 23 01:45:20 localhost kernel: usbcore: registered new interface driver usbfs Jan 23 01:45:20 localhost kernel: usbcore: registered new interface driver hub Jan 23 01:45:20 localhost kernel: usbcore: registered new device driver usb Jan 23 01:45:20 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Jan 23 01:45:20 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jan 23 01:45:20 localhost kernel: PTP clock support registered Jan 23 01:45:20 localhost kernel: EDAC MC: Ver: 3.0.0 Jan 23 01:45:20 localhost kernel: NetLabel: Initializing Jan 23 01:45:20 localhost kernel: NetLabel: domain hash size = 128 Jan 23 01:45:20 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Jan 23 01:45:20 localhost kernel: NetLabel: unlabeled traffic allowed by default Jan 23 01:45:20 localhost kernel: PCI: Using ACPI for IRQ routing Jan 23 01:45:20 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jan 23 01:45:20 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jan 23 01:45:20 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 23 01:45:20 localhost kernel: vgaarb: loaded Jan 23 01:45:20 localhost kernel: clocksource: Switched to clocksource kvm-clock Jan 23 01:45:20 localhost kernel: VFS: Disk quotas dquot_6.6.0 Jan 23 01:45:20 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 23 01:45:20 localhost kernel: pnp: PnP ACPI init Jan 23 01:45:20 localhost kernel: pnp: PnP ACPI: found 5 devices Jan 23 01:45:20 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 23 01:45:20 localhost kernel: NET: Registered PF_INET protocol family Jan 23 01:45:20 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 23 01:45:20 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Jan 23 01:45:20 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jan 23 01:45:20 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jan 23 01:45:20 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jan 23 01:45:20 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Jan 23 01:45:20 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Jan 23 01:45:20 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Jan 23 01:45:20 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Jan 23 01:45:20 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jan 23 01:45:20 localhost kernel: NET: Registered PF_XDP protocol family Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Jan 23 01:45:20 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Jan 23 01:45:20 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jan 23 01:45:20 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jan 23 01:45:20 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jan 23 01:45:20 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 27371 usecs Jan 23 01:45:20 localhost kernel: PCI: CLS 0 bytes, default 64 Jan 23 01:45:20 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jan 23 01:45:20 localhost kernel: Trying to unpack rootfs image as initramfs... Jan 23 01:45:20 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Jan 23 01:45:20 localhost kernel: ACPI: bus type thunderbolt registered Jan 23 01:45:20 localhost kernel: Initialise system trusted keyrings Jan 23 01:45:20 localhost kernel: Key type blacklist registered Jan 23 01:45:20 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Jan 23 01:45:20 localhost kernel: zbud: loaded Jan 23 01:45:20 localhost kernel: integrity: Platform Keyring initialized Jan 23 01:45:20 localhost kernel: NET: Registered PF_ALG protocol family Jan 23 01:45:20 localhost kernel: xor: automatically using best checksumming function avx Jan 23 01:45:20 localhost kernel: Key type asymmetric registered Jan 23 01:45:20 localhost kernel: Asymmetric key parser 'x509' registered Jan 23 01:45:20 localhost kernel: Running certificate verification selftests Jan 23 01:45:20 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Jan 23 01:45:20 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Jan 23 01:45:20 localhost kernel: io scheduler mq-deadline registered Jan 23 01:45:20 localhost kernel: io scheduler kyber registered Jan 23 01:45:20 localhost kernel: io scheduler bfq registered Jan 23 01:45:20 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Jan 23 01:45:20 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Jan 23 01:45:20 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Jan 23 01:45:20 localhost kernel: ACPI: button: Power Button [PWRF] Jan 23 01:45:20 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jan 23 01:45:20 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jan 23 01:45:20 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jan 23 01:45:20 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 23 01:45:20 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 23 01:45:20 localhost kernel: Non-volatile memory driver v1.3 Jan 23 01:45:20 localhost kernel: rdac: device handler registered Jan 23 01:45:20 localhost kernel: hp_sw: device handler registered Jan 23 01:45:20 localhost kernel: emc: device handler registered Jan 23 01:45:20 localhost kernel: alua: device handler registered Jan 23 01:45:20 localhost kernel: libphy: Fixed MDIO Bus: probed Jan 23 01:45:20 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Jan 23 01:45:20 localhost kernel: ehci-pci: EHCI PCI platform driver Jan 23 01:45:20 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Jan 23 01:45:20 localhost kernel: ohci-pci: OHCI PCI platform driver Jan 23 01:45:20 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Jan 23 01:45:20 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Jan 23 01:45:20 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Jan 23 01:45:20 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Jan 23 01:45:20 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Jan 23 01:45:20 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Jan 23 01:45:20 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jan 23 01:45:20 localhost kernel: usb usb1: Product: UHCI Host Controller Jan 23 01:45:20 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Jan 23 01:45:20 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Jan 23 01:45:20 localhost kernel: hub 1-0:1.0: USB hub found Jan 23 01:45:20 localhost kernel: hub 1-0:1.0: 2 ports detected Jan 23 01:45:20 localhost kernel: usbcore: registered new interface driver usbserial_generic Jan 23 01:45:20 localhost kernel: usbserial: USB Serial support registered for generic Jan 23 01:45:20 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 23 01:45:20 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 23 01:45:20 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 23 01:45:20 localhost kernel: mousedev: PS/2 mouse device common for all mice Jan 23 01:45:20 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Jan 23 01:45:20 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 23 01:45:20 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Jan 23 01:45:20 localhost kernel: rtc_cmos 00:04: registered as rtc0 Jan 23 01:45:20 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Jan 23 01:45:20 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-01-23T06:45:19 UTC (1769150719) Jan 23 01:45:20 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Jan 23 01:45:20 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Jan 23 01:45:20 localhost kernel: usbcore: registered new interface driver usbhid Jan 23 01:45:20 localhost kernel: usbhid: USB HID core driver Jan 23 01:45:20 localhost kernel: drop_monitor: Initializing network drop monitor service Jan 23 01:45:20 localhost kernel: Initializing XFRM netlink socket Jan 23 01:45:20 localhost kernel: NET: Registered PF_INET6 protocol family Jan 23 01:45:20 localhost kernel: Segment Routing with IPv6 Jan 23 01:45:20 localhost kernel: NET: Registered PF_PACKET protocol family Jan 23 01:45:20 localhost kernel: mpls_gso: MPLS GSO support Jan 23 01:45:20 localhost kernel: IPI shorthand broadcast: enabled Jan 23 01:45:20 localhost kernel: AVX2 version of gcm_enc/dec engaged. Jan 23 01:45:20 localhost kernel: AES CTR mode by8 optimization enabled Jan 23 01:45:20 localhost kernel: sched_clock: Marking stable (825748679, 185137536)->(1145551999, -134665784) Jan 23 01:45:20 localhost kernel: registered taskstats version 1 Jan 23 01:45:20 localhost kernel: Loading compiled-in X.509 certificates Jan 23 01:45:20 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Jan 23 01:45:20 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Jan 23 01:45:20 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Jan 23 01:45:20 localhost kernel: zswap: loaded using pool lzo/zbud Jan 23 01:45:20 localhost kernel: page_owner is disabled Jan 23 01:45:20 localhost kernel: Key type big_key registered Jan 23 01:45:20 localhost kernel: Freeing initrd memory: 74232K Jan 23 01:45:20 localhost kernel: Key type encrypted registered Jan 23 01:45:20 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Jan 23 01:45:20 localhost kernel: Loading compiled-in module X.509 certificates Jan 23 01:45:20 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Jan 23 01:45:20 localhost kernel: ima: Allocated hash algorithm: sha256 Jan 23 01:45:20 localhost kernel: ima: No architecture policies found Jan 23 01:45:20 localhost kernel: evm: Initialising EVM extended attributes: Jan 23 01:45:20 localhost kernel: evm: security.selinux Jan 23 01:45:20 localhost kernel: evm: security.SMACK64 (disabled) Jan 23 01:45:20 localhost kernel: evm: security.SMACK64EXEC (disabled) Jan 23 01:45:20 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Jan 23 01:45:20 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Jan 23 01:45:20 localhost kernel: evm: security.SMACK64MMAP (disabled) Jan 23 01:45:20 localhost kernel: evm: security.apparmor (disabled) Jan 23 01:45:20 localhost kernel: evm: security.ima Jan 23 01:45:20 localhost kernel: evm: security.capability Jan 23 01:45:20 localhost kernel: evm: HMAC attrs: 0x1 Jan 23 01:45:20 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Jan 23 01:45:20 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Jan 23 01:45:20 localhost kernel: usb 1-1: Product: QEMU USB Tablet Jan 23 01:45:20 localhost kernel: usb 1-1: Manufacturer: QEMU Jan 23 01:45:20 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Jan 23 01:45:20 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Jan 23 01:45:20 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Jan 23 01:45:20 localhost kernel: Freeing unused decrypted memory: 2036K Jan 23 01:45:20 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Jan 23 01:45:20 localhost kernel: Write protecting the kernel read-only data: 26624k Jan 23 01:45:20 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jan 23 01:45:20 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Jan 23 01:45:20 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Jan 23 01:45:20 localhost kernel: Run /init as init process Jan 23 01:45:20 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 23 01:45:20 localhost systemd[1]: Detected virtualization kvm. Jan 23 01:45:20 localhost systemd[1]: Detected architecture x86-64. Jan 23 01:45:20 localhost systemd[1]: Running in initrd. Jan 23 01:45:20 localhost systemd[1]: No hostname configured, using default hostname. Jan 23 01:45:20 localhost systemd[1]: Hostname set to . Jan 23 01:45:20 localhost systemd[1]: Initializing machine ID from VM UUID. Jan 23 01:45:20 localhost systemd[1]: Queued start job for default target Initrd Default Target. Jan 23 01:45:20 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 23 01:45:20 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 23 01:45:20 localhost systemd[1]: Reached target Initrd /usr File System. Jan 23 01:45:20 localhost systemd[1]: Reached target Local File Systems. Jan 23 01:45:20 localhost systemd[1]: Reached target Path Units. Jan 23 01:45:20 localhost systemd[1]: Reached target Slice Units. Jan 23 01:45:20 localhost systemd[1]: Reached target Swaps. Jan 23 01:45:20 localhost systemd[1]: Reached target Timer Units. Jan 23 01:45:20 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 23 01:45:20 localhost systemd[1]: Listening on Journal Socket (/dev/log). Jan 23 01:45:20 localhost systemd[1]: Listening on Journal Socket. Jan 23 01:45:20 localhost systemd[1]: Listening on udev Control Socket. Jan 23 01:45:20 localhost systemd[1]: Listening on udev Kernel Socket. Jan 23 01:45:20 localhost systemd[1]: Reached target Socket Units. Jan 23 01:45:20 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 23 01:45:20 localhost systemd[1]: Starting Journal Service... Jan 23 01:45:20 localhost systemd[1]: Starting Load Kernel Modules... Jan 23 01:45:20 localhost systemd[1]: Starting Create System Users... Jan 23 01:45:20 localhost systemd[1]: Starting Setup Virtual Console... Jan 23 01:45:20 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 23 01:45:20 localhost systemd[1]: Finished Load Kernel Modules. Jan 23 01:45:20 localhost systemd-journald[282]: Journal started Jan 23 01:45:20 localhost systemd-journald[282]: Runtime Journal (/run/log/journal/60e4aef49a3d45e9aeb732a07fb8148e) is 8.0M, max 314.7M, 306.7M free. Jan 23 01:45:20 localhost systemd-modules-load[283]: Module 'msr' is built in Jan 23 01:45:20 localhost systemd[1]: Started Journal Service. Jan 23 01:45:20 localhost systemd[1]: Finished Setup Virtual Console. Jan 23 01:45:20 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Jan 23 01:45:20 localhost systemd[1]: Starting dracut cmdline hook... Jan 23 01:45:20 localhost systemd[1]: Starting Apply Kernel Variables... Jan 23 01:45:20 localhost systemd-sysusers[284]: Creating group 'sgx' with GID 997. Jan 23 01:45:20 localhost systemd-sysusers[284]: Creating group 'users' with GID 100. Jan 23 01:45:20 localhost systemd-sysusers[284]: Creating group 'dbus' with GID 81. Jan 23 01:45:20 localhost systemd-sysusers[284]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Jan 23 01:45:20 localhost systemd[1]: Finished Create System Users. Jan 23 01:45:20 localhost systemd[1]: Finished Apply Kernel Variables. Jan 23 01:45:20 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 23 01:45:20 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 23 01:45:20 localhost dracut-cmdline[289]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Jan 23 01:45:20 localhost dracut-cmdline[289]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Jan 23 01:45:20 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 23 01:45:20 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 23 01:45:20 localhost systemd[1]: Finished dracut cmdline hook. Jan 23 01:45:20 localhost systemd[1]: Starting dracut pre-udev hook... Jan 23 01:45:20 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jan 23 01:45:20 localhost kernel: device-mapper: uevent: version 1.0.3 Jan 23 01:45:20 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Jan 23 01:45:20 localhost kernel: RPC: Registered named UNIX socket transport module. Jan 23 01:45:20 localhost kernel: RPC: Registered udp transport module. Jan 23 01:45:20 localhost kernel: RPC: Registered tcp transport module. Jan 23 01:45:20 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jan 23 01:45:20 localhost rpc.statd[409]: Version 2.5.4 starting Jan 23 01:45:20 localhost rpc.statd[409]: Initializing NSM state Jan 23 01:45:20 localhost rpc.idmapd[414]: Setting log level to 0 Jan 23 01:45:20 localhost systemd[1]: Finished dracut pre-udev hook. Jan 23 01:45:20 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 23 01:45:20 localhost systemd-udevd[427]: Using default interface naming scheme 'rhel-9.0'. Jan 23 01:45:20 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 23 01:45:20 localhost systemd[1]: Starting dracut pre-trigger hook... Jan 23 01:45:20 localhost systemd[1]: Finished dracut pre-trigger hook. Jan 23 01:45:20 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 23 01:45:20 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 23 01:45:20 localhost systemd[1]: Reached target System Initialization. Jan 23 01:45:20 localhost systemd[1]: Reached target Basic System. Jan 23 01:45:20 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 23 01:45:20 localhost systemd[1]: Reached target Network. Jan 23 01:45:20 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 23 01:45:20 localhost systemd[1]: Starting dracut initqueue hook... Jan 23 01:45:21 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Jan 23 01:45:21 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jan 23 01:45:21 localhost kernel: GPT:20971519 != 838860799 Jan 23 01:45:21 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Jan 23 01:45:21 localhost kernel: GPT:20971519 != 838860799 Jan 23 01:45:21 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Jan 23 01:45:21 localhost kernel: vda: vda1 vda2 vda3 vda4 Jan 23 01:45:21 localhost systemd-udevd[441]: Network interface NamePolicy= disabled on kernel command line. Jan 23 01:45:21 localhost kernel: scsi host0: ata_piix Jan 23 01:45:21 localhost kernel: scsi host1: ata_piix Jan 23 01:45:21 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Jan 23 01:45:21 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Jan 23 01:45:21 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Jan 23 01:45:21 localhost systemd[1]: Reached target Initrd Root Device. Jan 23 01:45:21 localhost kernel: ata1: found unknown device (class 0) Jan 23 01:45:21 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 23 01:45:21 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 23 01:45:21 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Jan 23 01:45:21 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 23 01:45:21 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 23 01:45:21 localhost systemd[1]: Finished dracut initqueue hook. Jan 23 01:45:21 localhost systemd[1]: Reached target Preparation for Remote File Systems. Jan 23 01:45:21 localhost systemd[1]: Reached target Remote Encrypted Volumes. Jan 23 01:45:21 localhost systemd[1]: Reached target Remote File Systems. Jan 23 01:45:21 localhost systemd[1]: Starting dracut pre-mount hook... Jan 23 01:45:21 localhost systemd[1]: Finished dracut pre-mount hook. Jan 23 01:45:21 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Jan 23 01:45:21 localhost systemd-fsck[512]: /usr/sbin/fsck.xfs: XFS file system. Jan 23 01:45:21 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Jan 23 01:45:21 localhost systemd[1]: Mounting /sysroot... Jan 23 01:45:21 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Jan 23 01:45:21 localhost kernel: XFS (vda4): Mounting V5 Filesystem Jan 23 01:45:21 localhost kernel: XFS (vda4): Ending clean mount Jan 23 01:45:21 localhost systemd[1]: Mounted /sysroot. Jan 23 01:45:21 localhost systemd[1]: Reached target Initrd Root File System. Jan 23 01:45:21 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Jan 23 01:45:21 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 23 01:45:21 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Jan 23 01:45:21 localhost systemd[1]: Reached target Initrd File Systems. Jan 23 01:45:21 localhost systemd[1]: Reached target Initrd Default Target. Jan 23 01:45:21 localhost systemd[1]: Starting dracut mount hook... Jan 23 01:45:21 localhost systemd[1]: Finished dracut mount hook. Jan 23 01:45:21 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 23 01:45:21 localhost rpc.idmapd[414]: exiting on signal 15 Jan 23 01:45:21 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Jan 23 01:45:21 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 23 01:45:21 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 23 01:45:21 localhost systemd[1]: Stopped target Network. Jan 23 01:45:21 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Jan 23 01:45:21 localhost systemd[1]: Stopped target Timer Units. Jan 23 01:45:21 localhost systemd[1]: dbus.socket: Deactivated successfully. Jan 23 01:45:21 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Jan 23 01:45:21 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 23 01:45:21 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 23 01:45:21 localhost systemd[1]: Stopped target Initrd Default Target. Jan 23 01:45:21 localhost systemd[1]: Stopped target Basic System. Jan 23 01:45:21 localhost systemd[1]: Stopped target Initrd Root Device. Jan 23 01:45:21 localhost systemd[1]: Stopped target Initrd /usr File System. Jan 23 01:45:21 localhost systemd[1]: Stopped target Path Units. Jan 23 01:45:21 localhost systemd[1]: Stopped target Remote File Systems. Jan 23 01:45:21 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Jan 23 01:45:21 localhost systemd[1]: Stopped target Slice Units. Jan 23 01:45:21 localhost systemd[1]: Stopped target Socket Units. Jan 23 01:45:21 localhost systemd[1]: Stopped target System Initialization. Jan 23 01:45:21 localhost systemd[1]: Stopped target Local File Systems. Jan 23 01:45:21 localhost systemd[1]: Stopped target Swaps. Jan 23 01:45:22 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped dracut mount hook. Jan 23 01:45:22 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped dracut pre-mount hook. Jan 23 01:45:22 localhost systemd[1]: Stopped target Local Encrypted Volumes. Jan 23 01:45:22 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 23 01:45:22 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped dracut initqueue hook. Jan 23 01:45:22 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Apply Kernel Variables. Jan 23 01:45:22 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Load Kernel Modules. Jan 23 01:45:22 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Create Volatile Files and Directories. Jan 23 01:45:22 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Coldplug All udev Devices. Jan 23 01:45:22 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped dracut pre-trigger hook. Jan 23 01:45:22 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 23 01:45:22 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Setup Virtual Console. Jan 23 01:45:22 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 23 01:45:22 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Closed udev Control Socket. Jan 23 01:45:22 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Closed udev Kernel Socket. Jan 23 01:45:22 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped dracut pre-udev hook. Jan 23 01:45:22 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped dracut cmdline hook. Jan 23 01:45:22 localhost systemd[1]: Starting Cleanup udev Database... Jan 23 01:45:22 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 23 01:45:22 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Create List of Static Device Nodes. Jan 23 01:45:22 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Create System Users. Jan 23 01:45:22 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 23 01:45:22 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Finished Cleanup udev Database. Jan 23 01:45:22 localhost systemd[1]: Reached target Switch Root. Jan 23 01:45:22 localhost systemd[1]: Starting Switch Root... Jan 23 01:45:22 localhost systemd[1]: Switching root. Jan 23 01:45:22 localhost systemd-journald[282]: Journal stopped Jan 23 01:45:22 localhost systemd-journald[282]: Received SIGTERM from PID 1 (systemd). Jan 23 01:45:22 localhost kernel: audit: type=1404 audit(1769150722.191:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Jan 23 01:45:22 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 01:45:22 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 01:45:22 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 01:45:22 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 01:45:22 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 01:45:22 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 01:45:22 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 01:45:22 localhost kernel: audit: type=1403 audit(1769150722.298:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 23 01:45:22 localhost systemd[1]: Successfully loaded SELinux policy in 109.710ms. Jan 23 01:45:22 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.253ms. Jan 23 01:45:22 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 23 01:45:22 localhost systemd[1]: Detected virtualization kvm. Jan 23 01:45:22 localhost systemd[1]: Detected architecture x86-64. Jan 23 01:45:22 localhost systemd-rc-local-generator[582]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 01:45:22 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 01:45:22 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped Switch Root. Jan 23 01:45:22 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 23 01:45:22 localhost systemd[1]: Created slice Slice /system/getty. Jan 23 01:45:22 localhost systemd[1]: Created slice Slice /system/modprobe. Jan 23 01:45:22 localhost systemd[1]: Created slice Slice /system/serial-getty. Jan 23 01:45:22 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Jan 23 01:45:22 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Jan 23 01:45:22 localhost systemd[1]: Created slice User and Session Slice. Jan 23 01:45:22 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 23 01:45:22 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 23 01:45:22 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 23 01:45:22 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 23 01:45:22 localhost systemd[1]: Stopped target Switch Root. Jan 23 01:45:22 localhost systemd[1]: Stopped target Initrd File Systems. Jan 23 01:45:22 localhost systemd[1]: Stopped target Initrd Root File System. Jan 23 01:45:22 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Jan 23 01:45:22 localhost systemd[1]: Reached target Path Units. Jan 23 01:45:22 localhost systemd[1]: Reached target rpc_pipefs.target. Jan 23 01:45:22 localhost systemd[1]: Reached target Slice Units. Jan 23 01:45:22 localhost systemd[1]: Reached target Swaps. Jan 23 01:45:22 localhost systemd[1]: Reached target Local Verity Protected Volumes. Jan 23 01:45:22 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Jan 23 01:45:22 localhost systemd[1]: Reached target RPC Port Mapper. Jan 23 01:45:22 localhost systemd[1]: Listening on Process Core Dump Socket. Jan 23 01:45:22 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 23 01:45:22 localhost systemd[1]: Listening on udev Control Socket. Jan 23 01:45:22 localhost systemd[1]: Listening on udev Kernel Socket. Jan 23 01:45:22 localhost systemd[1]: Mounting Huge Pages File System... Jan 23 01:45:22 localhost systemd[1]: Mounting POSIX Message Queue File System... Jan 23 01:45:22 localhost systemd[1]: Mounting Kernel Debug File System... Jan 23 01:45:22 localhost systemd[1]: Mounting Kernel Trace File System... Jan 23 01:45:22 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 23 01:45:22 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 23 01:45:22 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 23 01:45:22 localhost systemd[1]: Starting Load Kernel Module drm... Jan 23 01:45:22 localhost systemd[1]: Starting Load Kernel Module fuse... Jan 23 01:45:22 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Jan 23 01:45:22 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Stopped File System Check on Root Device. Jan 23 01:45:22 localhost systemd[1]: Stopped Journal Service. Jan 23 01:45:22 localhost systemd[1]: Starting Journal Service... Jan 23 01:45:22 localhost systemd[1]: Starting Load Kernel Modules... Jan 23 01:45:22 localhost systemd[1]: Starting Generate network units from Kernel command line... Jan 23 01:45:22 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Jan 23 01:45:22 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Jan 23 01:45:22 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 23 01:45:22 localhost kernel: fuse: init (API version 7.36) Jan 23 01:45:22 localhost systemd[1]: Mounted Huge Pages File System. Jan 23 01:45:22 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Jan 23 01:45:22 localhost systemd[1]: Mounted POSIX Message Queue File System. Jan 23 01:45:22 localhost systemd[1]: Mounted Kernel Debug File System. Jan 23 01:45:22 localhost systemd[1]: Mounted Kernel Trace File System. Jan 23 01:45:22 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 23 01:45:22 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 23 01:45:22 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Finished Load Kernel Module fuse. Jan 23 01:45:22 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Jan 23 01:45:22 localhost kernel: ACPI: bus type drm_connector registered Jan 23 01:45:22 localhost systemd-journald[618]: Journal started Jan 23 01:45:22 localhost systemd-journald[618]: Runtime Journal (/run/log/journal/3e33164a5d30c3060156ec878079cfde) is 8.0M, max 314.7M, 306.7M free. Jan 23 01:45:22 localhost systemd[1]: Queued start job for default target Multi-User System. Jan 23 01:45:22 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd-modules-load[619]: Module 'msr' is built in Jan 23 01:45:22 localhost systemd[1]: Finished Load Kernel Modules. Jan 23 01:45:22 localhost systemd[1]: Started Journal Service. Jan 23 01:45:22 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 23 01:45:22 localhost systemd[1]: Finished Load Kernel Module drm. Jan 23 01:45:22 localhost systemd[1]: Finished Generate network units from Kernel command line. Jan 23 01:45:22 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Jan 23 01:45:22 localhost systemd[1]: Mounting FUSE Control File System... Jan 23 01:45:22 localhost systemd[1]: Mounting Kernel Configuration File System... Jan 23 01:45:22 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 23 01:45:22 localhost systemd[1]: Starting Rebuild Hardware Database... Jan 23 01:45:22 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Jan 23 01:45:22 localhost systemd[1]: Starting Load/Save Random Seed... Jan 23 01:45:22 localhost systemd[1]: Starting Apply Kernel Variables... Jan 23 01:45:22 localhost systemd-journald[618]: Runtime Journal (/run/log/journal/3e33164a5d30c3060156ec878079cfde) is 8.0M, max 314.7M, 306.7M free. Jan 23 01:45:22 localhost systemd-journald[618]: Received client request to flush runtime journal. Jan 23 01:45:22 localhost systemd[1]: Starting Create System Users... Jan 23 01:45:22 localhost systemd[1]: Mounted FUSE Control File System. Jan 23 01:45:22 localhost systemd[1]: Mounted Kernel Configuration File System. Jan 23 01:45:22 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Jan 23 01:45:22 localhost systemd[1]: Finished Load/Save Random Seed. Jan 23 01:45:22 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 23 01:45:22 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 23 01:45:22 localhost systemd[1]: Finished Apply Kernel Variables. Jan 23 01:45:22 localhost systemd-sysusers[632]: Creating group 'sgx' with GID 989. Jan 23 01:45:22 localhost systemd-sysusers[632]: Creating group 'systemd-oom' with GID 988. Jan 23 01:45:22 localhost systemd-sysusers[632]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Jan 23 01:45:22 localhost systemd[1]: Finished Create System Users. Jan 23 01:45:22 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 23 01:45:22 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 23 01:45:22 localhost systemd[1]: Reached target Preparation for Local File Systems. Jan 23 01:45:22 localhost systemd[1]: Set up automount EFI System Partition Automount. Jan 23 01:45:23 localhost systemd[1]: Finished Rebuild Hardware Database. Jan 23 01:45:23 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 23 01:45:23 localhost systemd-udevd[636]: Using default interface naming scheme 'rhel-9.0'. Jan 23 01:45:23 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 23 01:45:23 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 23 01:45:23 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 23 01:45:23 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 23 01:45:23 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Jan 23 01:45:23 localhost systemd-udevd[641]: Network interface NamePolicy= disabled on kernel command line. Jan 23 01:45:23 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Jan 23 01:45:23 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Jan 23 01:45:23 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Jan 23 01:45:23 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Jan 23 01:45:23 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jan 23 01:45:23 localhost systemd-fsck[680]: fsck.fat 4.2 (2021-01-31) Jan 23 01:45:23 localhost systemd-fsck[680]: /dev/vda2: 12 files, 1782/51145 clusters Jan 23 01:45:23 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Jan 23 01:45:23 localhost kernel: SVM: TSC scaling supported Jan 23 01:45:23 localhost kernel: kvm: Nested Virtualization enabled Jan 23 01:45:23 localhost kernel: SVM: kvm: Nested Paging enabled Jan 23 01:45:23 localhost kernel: SVM: LBR virtualization supported Jan 23 01:45:23 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Jan 23 01:45:23 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Jan 23 01:45:23 localhost kernel: Console: switching to colour dummy device 80x25 Jan 23 01:45:23 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Jan 23 01:45:23 localhost kernel: [drm] features: -context_init Jan 23 01:45:23 localhost kernel: [drm] number of scanouts: 1 Jan 23 01:45:23 localhost kernel: [drm] number of cap sets: 0 Jan 23 01:45:23 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Jan 23 01:45:23 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Jan 23 01:45:23 localhost kernel: Console: switching to colour frame buffer device 128x48 Jan 23 01:45:23 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Jan 23 01:45:23 localhost systemd[1]: Mounting /boot... Jan 23 01:45:23 localhost kernel: XFS (vda3): Mounting V5 Filesystem Jan 23 01:45:23 localhost kernel: XFS (vda3): Ending clean mount Jan 23 01:45:23 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Jan 23 01:45:23 localhost systemd[1]: Mounted /boot. Jan 23 01:45:23 localhost systemd[1]: Mounting /boot/efi... Jan 23 01:45:23 localhost systemd[1]: Mounted /boot/efi. Jan 23 01:45:23 localhost systemd[1]: Reached target Local File Systems. Jan 23 01:45:23 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 23 01:45:23 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Jan 23 01:45:23 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 23 01:45:23 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 23 01:45:23 localhost systemd[1]: Starting Automatic Boot Loader Update... Jan 23 01:45:23 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Jan 23 01:45:23 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 23 01:45:23 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 711 (bootctl) Jan 23 01:45:23 localhost systemd[1]: Starting File System Check on /dev/vda2... Jan 23 01:45:23 localhost systemd[1]: Finished File System Check on /dev/vda2. Jan 23 01:45:23 localhost systemd[1]: Mounting EFI System Partition Automount... Jan 23 01:45:23 localhost systemd[1]: Mounted EFI System Partition Automount. Jan 23 01:45:23 localhost systemd[1]: Finished Automatic Boot Loader Update. Jan 23 01:45:24 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 23 01:45:24 localhost systemd[1]: Starting Security Auditing Service... Jan 23 01:45:24 localhost systemd[1]: Starting RPC Bind... Jan 23 01:45:24 localhost systemd[1]: Starting Rebuild Journal Catalog... Jan 23 01:45:24 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 23 01:45:24 localhost auditd[726]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Jan 23 01:45:24 localhost auditd[726]: Init complete, auditd 3.0.7 listening for events (startup state enable) Jan 23 01:45:24 localhost systemd[1]: Started RPC Bind. Jan 23 01:45:24 localhost systemd[1]: Finished Rebuild Journal Catalog. Jan 23 01:45:24 localhost systemd[1]: Starting Update is Completed... Jan 23 01:45:24 localhost systemd[1]: Finished Update is Completed. Jan 23 01:45:24 localhost augenrules[731]: /sbin/augenrules: No change Jan 23 01:45:24 localhost augenrules[742]: No rules Jan 23 01:45:24 localhost augenrules[742]: enabled 1 Jan 23 01:45:24 localhost augenrules[742]: failure 1 Jan 23 01:45:24 localhost augenrules[742]: pid 726 Jan 23 01:45:24 localhost augenrules[742]: rate_limit 0 Jan 23 01:45:24 localhost augenrules[742]: backlog_limit 8192 Jan 23 01:45:24 localhost augenrules[742]: lost 0 Jan 23 01:45:24 localhost augenrules[742]: backlog 3 Jan 23 01:45:24 localhost augenrules[742]: backlog_wait_time 60000 Jan 23 01:45:24 localhost augenrules[742]: backlog_wait_time_actual 0 Jan 23 01:45:24 localhost augenrules[742]: enabled 1 Jan 23 01:45:24 localhost augenrules[742]: failure 1 Jan 23 01:45:24 localhost augenrules[742]: pid 726 Jan 23 01:45:24 localhost augenrules[742]: rate_limit 0 Jan 23 01:45:24 localhost augenrules[742]: backlog_limit 8192 Jan 23 01:45:24 localhost augenrules[742]: lost 0 Jan 23 01:45:24 localhost augenrules[742]: backlog 4 Jan 23 01:45:24 localhost augenrules[742]: backlog_wait_time 60000 Jan 23 01:45:24 localhost augenrules[742]: backlog_wait_time_actual 0 Jan 23 01:45:24 localhost augenrules[742]: enabled 1 Jan 23 01:45:24 localhost augenrules[742]: failure 1 Jan 23 01:45:24 localhost augenrules[742]: pid 726 Jan 23 01:45:24 localhost augenrules[742]: rate_limit 0 Jan 23 01:45:24 localhost augenrules[742]: backlog_limit 8192 Jan 23 01:45:24 localhost augenrules[742]: lost 0 Jan 23 01:45:24 localhost augenrules[742]: backlog 2 Jan 23 01:45:24 localhost augenrules[742]: backlog_wait_time 60000 Jan 23 01:45:24 localhost augenrules[742]: backlog_wait_time_actual 0 Jan 23 01:45:24 localhost systemd[1]: Started Security Auditing Service. Jan 23 01:45:24 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 23 01:45:24 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 23 01:45:24 localhost systemd[1]: Reached target System Initialization. Jan 23 01:45:24 localhost systemd[1]: Started dnf makecache --timer. Jan 23 01:45:24 localhost systemd[1]: Started Daily rotation of log files. Jan 23 01:45:24 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 23 01:45:24 localhost systemd[1]: Reached target Timer Units. Jan 23 01:45:24 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 23 01:45:24 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Jan 23 01:45:24 localhost systemd[1]: Reached target Socket Units. Jan 23 01:45:24 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Jan 23 01:45:24 localhost systemd[1]: Starting D-Bus System Message Bus... Jan 23 01:45:24 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 23 01:45:24 localhost systemd[1]: Started D-Bus System Message Bus. Jan 23 01:45:24 localhost systemd[1]: Reached target Basic System. Jan 23 01:45:24 localhost systemd[1]: Starting NTP client/server... Jan 23 01:45:24 localhost journal[751]: Ready Jan 23 01:45:24 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Jan 23 01:45:24 localhost systemd[1]: Started irqbalance daemon. Jan 23 01:45:24 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Jan 23 01:45:24 localhost systemd[1]: Starting System Logging Service... Jan 23 01:45:24 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 01:45:24 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 01:45:24 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 01:45:24 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 01:45:24 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Jan 23 01:45:24 localhost systemd[1]: Reached target User and Group Name Lookups. Jan 23 01:45:24 localhost rsyslogd[759]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="759" x-info="https://www.rsyslog.com"] start Jan 23 01:45:24 localhost rsyslogd[759]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Jan 23 01:45:24 localhost systemd[1]: Starting User Login Management... Jan 23 01:45:24 localhost systemd[1]: Started System Logging Service. Jan 23 01:45:24 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Jan 23 01:45:24 localhost chronyd[766]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Jan 23 01:45:24 localhost chronyd[766]: Using right/UTC timezone to obtain leap second data Jan 23 01:45:24 localhost chronyd[766]: Loaded seccomp filter (level 2) Jan 23 01:45:24 localhost systemd[1]: Started NTP client/server. Jan 23 01:45:24 localhost systemd-logind[764]: New seat seat0. Jan 23 01:45:24 localhost systemd-logind[764]: Watching system buttons on /dev/input/event0 (Power Button) Jan 23 01:45:24 localhost systemd-logind[764]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 23 01:45:24 localhost systemd[1]: Started User Login Management. Jan 23 01:45:24 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 01:45:24 localhost cloud-init[770]: Cloud-init v. 22.1-9.el9 running 'init-local' at Fri, 23 Jan 2026 06:45:24 +0000. Up 5.75 seconds. Jan 23 01:45:24 localhost systemd[1]: Starting Hostname Service... Jan 23 01:45:24 localhost systemd[1]: Started Hostname Service. Jan 23 01:45:24 localhost systemd-hostnamed[784]: Hostname set to (static) Jan 23 01:45:24 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Jan 23 01:45:24 localhost systemd[1]: Reached target Preparation for Network. Jan 23 01:45:24 localhost systemd[1]: Starting Network Manager... Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0390] NetworkManager (version 1.42.2-1.el9) is starting... (boot:11c5c5c1-9331-4af7-b795-6213ce5ad7a0) Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0397] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Jan 23 01:45:25 localhost systemd[1]: Started Network Manager. Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0429] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Jan 23 01:45:25 localhost systemd[1]: Reached target Network. Jan 23 01:45:25 localhost systemd[1]: Starting Network Manager Wait Online... Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0507] manager[0x55a793154020]: monitoring kernel firmware directory '/lib/firmware'. Jan 23 01:45:25 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0552] hostname: hostname: using hostnamed Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0553] hostname: static hostname changed from (none) to "np0005593103.novalocal" Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0562] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Jan 23 01:45:25 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Jan 23 01:45:25 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Jan 23 01:45:25 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0698] manager[0x55a793154020]: rfkill: Wi-Fi hardware radio set enabled Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0699] manager[0x55a793154020]: rfkill: WWAN hardware radio set enabled Jan 23 01:45:25 localhost systemd[1]: Started GSSAPI Proxy Daemon. Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0765] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0768] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Jan 23 01:45:25 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0775] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0777] manager: Networking is enabled by state file Jan 23 01:45:25 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 23 01:45:25 localhost systemd[1]: Reached target NFS client services. Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0805] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0807] settings: Loaded settings plugin: keyfile (internal) Jan 23 01:45:25 localhost systemd[1]: Reached target Preparation for Remote File Systems. Jan 23 01:45:25 localhost systemd[1]: Reached target Remote File Systems. Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0843] dhcp: init: Using DHCP client 'internal' Jan 23 01:45:25 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0848] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0870] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0879] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0891] device (lo): Activation: starting connection 'lo' (a4dde0e0-23aa-447c-a7f4-3f0d7aa6442a) Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0905] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0911] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Jan 23 01:45:25 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0964] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0969] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0972] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0976] device (eth0): carrier: link connected Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0979] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0985] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.0994] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1000] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1002] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1006] manager: NetworkManager state is now CONNECTING Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1008] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1031] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1036] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:45:25 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1090] dhcp4 (eth0): state changed new lease, address=38.102.83.132 Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1094] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1124] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1134] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1138] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1145] device (lo): Activation: successful, device activated. Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1166] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1169] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1176] manager: NetworkManager state is now CONNECTED_SITE Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1180] device (eth0): Activation: successful, device activated. Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1185] manager: NetworkManager state is now CONNECTED_GLOBAL Jan 23 01:45:25 localhost NetworkManager[789]: [1769150725.1191] manager: startup complete Jan 23 01:45:25 localhost systemd[1]: Finished Network Manager Wait Online. Jan 23 01:45:25 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Jan 23 01:45:25 localhost cloud-init[984]: Cloud-init v. 22.1-9.el9 running 'init' at Fri, 23 Jan 2026 06:45:25 +0000. Up 6.61 seconds. Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | eth0 | True | 38.102.83.132 | 255.255.255.0 | global | fa:16:3e:7b:60:86 | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | eth0 | True | fe80::f816:3eff:fe7b:6086/64 | . | link | fa:16:3e:7b:60:86 | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | lo | True | ::1/128 | . | host | . | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | Route | Destination | Gateway | Interface | Flags | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: | 3 | multicast | :: | eth0 | U | Jan 23 01:45:25 localhost cloud-init[984]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 23 01:45:25 localhost systemd[1]: Starting Authorization Manager... Jan 23 01:45:25 localhost polkitd[1036]: Started polkitd version 0.117 Jan 23 01:45:25 localhost systemd[1]: Started Dynamic System Tuning Daemon. Jan 23 01:45:25 localhost systemd[1]: Started Authorization Manager. Jan 23 01:45:27 localhost cloud-init[984]: Generating public/private rsa key pair. Jan 23 01:45:27 localhost cloud-init[984]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Jan 23 01:45:27 localhost cloud-init[984]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Jan 23 01:45:27 localhost cloud-init[984]: The key fingerprint is: Jan 23 01:45:27 localhost cloud-init[984]: SHA256:CDglK7EeiYW6+4Js7wzPSZUjzObvKFyKE7qttogcRxg root@np0005593103.novalocal Jan 23 01:45:27 localhost cloud-init[984]: The key's randomart image is: Jan 23 01:45:27 localhost cloud-init[984]: +---[RSA 3072]----+ Jan 23 01:45:27 localhost cloud-init[984]: |..o . | Jan 23 01:45:27 localhost cloud-init[984]: |o+.= | Jan 23 01:45:27 localhost cloud-init[984]: |=E+ . | Jan 23 01:45:27 localhost cloud-init[984]: |o.*. ... | Jan 23 01:45:27 localhost cloud-init[984]: | + * +. S | Jan 23 01:45:27 localhost cloud-init[984]: |o +.o . | Jan 23 01:45:27 localhost cloud-init[984]: |*=o+ | Jan 23 01:45:27 localhost cloud-init[984]: |@OO + | Jan 23 01:45:27 localhost cloud-init[984]: |BOBO.o | Jan 23 01:45:27 localhost cloud-init[984]: +----[SHA256]-----+ Jan 23 01:45:27 localhost cloud-init[984]: Generating public/private ecdsa key pair. Jan 23 01:45:27 localhost cloud-init[984]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Jan 23 01:45:27 localhost cloud-init[984]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Jan 23 01:45:27 localhost cloud-init[984]: The key fingerprint is: Jan 23 01:45:27 localhost cloud-init[984]: SHA256:6m70mdAmBC2avh/ZIokJi5tcqAAR9uT67lM5zRSsUjE root@np0005593103.novalocal Jan 23 01:45:27 localhost cloud-init[984]: The key's randomart image is: Jan 23 01:45:27 localhost cloud-init[984]: +---[ECDSA 256]---+ Jan 23 01:45:27 localhost cloud-init[984]: |.. . Eo | Jan 23 01:45:27 localhost cloud-init[984]: |..+ o.oo | Jan 23 01:45:27 localhost cloud-init[984]: |. =.o. . | Jan 23 01:45:27 localhost cloud-init[984]: | .+. ... | Jan 23 01:45:27 localhost cloud-init[984]: |oo ..=.S | Jan 23 01:45:27 localhost cloud-init[984]: |+++. *++o | Jan 23 01:45:27 localhost cloud-init[984]: |*.o+=.+= o | Jan 23 01:45:27 localhost cloud-init[984]: |+o+o +. + | Jan 23 01:45:27 localhost cloud-init[984]: |+..+ooo | Jan 23 01:45:27 localhost cloud-init[984]: +----[SHA256]-----+ Jan 23 01:45:27 localhost cloud-init[984]: Generating public/private ed25519 key pair. Jan 23 01:45:27 localhost cloud-init[984]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Jan 23 01:45:27 localhost cloud-init[984]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Jan 23 01:45:27 localhost cloud-init[984]: The key fingerprint is: Jan 23 01:45:27 localhost cloud-init[984]: SHA256:1BpG+t8+JSmXOgofnBRim8lgQn/9IYTGdFt7DkMCBis root@np0005593103.novalocal Jan 23 01:45:27 localhost cloud-init[984]: The key's randomart image is: Jan 23 01:45:27 localhost cloud-init[984]: +--[ED25519 256]--+ Jan 23 01:45:27 localhost cloud-init[984]: | . .++o= o | Jan 23 01:45:27 localhost cloud-init[984]: | . . o+* * . | Jan 23 01:45:27 localhost cloud-init[984]: | E =.= O * . | Jan 23 01:45:27 localhost cloud-init[984]: | + = O * * | Jan 23 01:45:27 localhost cloud-init[984]: | = S . .o | Jan 23 01:45:27 localhost cloud-init[984]: | o o..= . | Jan 23 01:45:27 localhost cloud-init[984]: | . + .+.o | Jan 23 01:45:27 localhost cloud-init[984]: | o .o.. | Jan 23 01:45:27 localhost cloud-init[984]: | o. ... | Jan 23 01:45:27 localhost cloud-init[984]: +----[SHA256]-----+ Jan 23 01:45:27 localhost sm-notify[1128]: Version 2.5.4 starting Jan 23 01:45:27 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Jan 23 01:45:27 localhost systemd[1]: Reached target Cloud-config availability. Jan 23 01:45:27 localhost systemd[1]: Reached target Network is Online. Jan 23 01:45:27 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Jan 23 01:45:27 localhost sshd[1129]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:27 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Jan 23 01:45:27 localhost systemd[1]: Starting Crash recovery kernel arming... Jan 23 01:45:27 localhost systemd[1]: Starting Notify NFS peers of a restart... Jan 23 01:45:27 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 01:45:27 localhost systemd[1]: Starting Permit User Sessions... Jan 23 01:45:27 localhost systemd[1]: Started Notify NFS peers of a restart. Jan 23 01:45:27 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 01:45:27 localhost systemd[1]: Finished Permit User Sessions. Jan 23 01:45:27 localhost systemd[1]: Started Command Scheduler. Jan 23 01:45:27 localhost systemd[1]: Started Getty on tty1. Jan 23 01:45:27 localhost systemd[1]: Started Serial Getty on ttyS0. Jan 23 01:45:27 localhost systemd[1]: Reached target Login Prompts. Jan 23 01:45:27 localhost systemd[1]: Reached target Multi-User System. Jan 23 01:45:27 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Jan 23 01:45:27 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 23 01:45:27 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Jan 23 01:45:27 localhost kdumpctl[1132]: kdump: No kdump initial ramdisk found. Jan 23 01:45:27 localhost kdumpctl[1132]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Jan 23 01:45:27 localhost cloud-init[1233]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Fri, 23 Jan 2026 06:45:27 +0000. Up 9.05 seconds. Jan 23 01:45:27 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Jan 23 01:45:27 localhost systemd[1]: Starting Execute cloud user/final scripts... Jan 23 01:45:28 localhost dracut[1416]: dracut-057-21.git20230214.el9 Jan 23 01:45:28 localhost cloud-init[1417]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Fri, 23 Jan 2026 06:45:28 +0000. Up 9.43 seconds. Jan 23 01:45:28 localhost sshd[1433]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:28 localhost cloud-init[1437]: ############################################################# Jan 23 01:45:28 localhost cloud-init[1438]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Jan 23 01:45:28 localhost sshd[1436]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:28 localhost cloud-init[1440]: 256 SHA256:6m70mdAmBC2avh/ZIokJi5tcqAAR9uT67lM5zRSsUjE root@np0005593103.novalocal (ECDSA) Jan 23 01:45:28 localhost cloud-init[1447]: 256 SHA256:1BpG+t8+JSmXOgofnBRim8lgQn/9IYTGdFt7DkMCBis root@np0005593103.novalocal (ED25519) Jan 23 01:45:28 localhost cloud-init[1455]: 3072 SHA256:CDglK7EeiYW6+4Js7wzPSZUjzObvKFyKE7qttogcRxg root@np0005593103.novalocal (RSA) Jan 23 01:45:28 localhost cloud-init[1457]: -----END SSH HOST KEY FINGERPRINTS----- Jan 23 01:45:28 localhost sshd[1446]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:28 localhost cloud-init[1458]: ############################################################# Jan 23 01:45:28 localhost dracut[1419]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Jan 23 01:45:28 localhost sshd[1468]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:28 localhost sshd[1470]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:28 localhost cloud-init[1417]: Cloud-init v. 22.1-9.el9 finished at Fri, 23 Jan 2026 06:45:28 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 9.68 seconds Jan 23 01:45:28 localhost sshd[1474]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:28 localhost sshd[1492]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:28 localhost sshd[1517]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:28 localhost sshd[1540]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:28 localhost systemd[1]: Reloading Network Manager... Jan 23 01:45:28 localhost NetworkManager[789]: [1769150728.5506] audit: op="reload" arg="0" pid=1551 uid=0 result="success" Jan 23 01:45:28 localhost NetworkManager[789]: [1769150728.5517] config: signal: SIGHUP (no changes from disk) Jan 23 01:45:28 localhost systemd[1]: Reloaded Network Manager. Jan 23 01:45:28 localhost systemd[1]: Finished Execute cloud user/final scripts. Jan 23 01:45:28 localhost systemd[1]: Reached target Cloud-init target. Jan 23 01:45:28 localhost dracut[1419]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 23 01:45:28 localhost dracut[1419]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 23 01:45:28 localhost dracut[1419]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 23 01:45:29 localhost dracut[1419]: memstrack is not available Jan 23 01:45:29 localhost dracut[1419]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 23 01:45:29 localhost dracut[1419]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 23 01:45:29 localhost dracut[1419]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 23 01:45:29 localhost dracut[1419]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 23 01:45:29 localhost dracut[1419]: memstrack is not available Jan 23 01:45:29 localhost dracut[1419]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 23 01:45:29 localhost dracut[1419]: *** Including module: systemd *** Jan 23 01:45:29 localhost dracut[1419]: *** Including module: systemd-initrd *** Jan 23 01:45:29 localhost dracut[1419]: *** Including module: i18n *** Jan 23 01:45:29 localhost dracut[1419]: No KEYMAP configured. Jan 23 01:45:29 localhost dracut[1419]: *** Including module: drm *** Jan 23 01:45:30 localhost chronyd[766]: Selected source 23.128.92.19 (2.rhel.pool.ntp.org) Jan 23 01:45:30 localhost chronyd[766]: System clock TAI offset set to 37 seconds Jan 23 01:45:30 localhost dracut[1419]: *** Including module: prefixdevname *** Jan 23 01:45:30 localhost dracut[1419]: *** Including module: kernel-modules *** Jan 23 01:45:30 localhost dracut[1419]: *** Including module: kernel-modules-extra *** Jan 23 01:45:30 localhost dracut[1419]: *** Including module: qemu *** Jan 23 01:45:31 localhost dracut[1419]: *** Including module: fstab-sys *** Jan 23 01:45:31 localhost dracut[1419]: *** Including module: rootfs-block *** Jan 23 01:45:31 localhost dracut[1419]: *** Including module: terminfo *** Jan 23 01:45:31 localhost dracut[1419]: *** Including module: udev-rules *** Jan 23 01:45:31 localhost dracut[1419]: Skipping udev rule: 91-permissions.rules Jan 23 01:45:31 localhost dracut[1419]: Skipping udev rule: 80-drivers-modprobe.rules Jan 23 01:45:31 localhost dracut[1419]: *** Including module: virtiofs *** Jan 23 01:45:31 localhost dracut[1419]: *** Including module: dracut-systemd *** Jan 23 01:45:31 localhost dracut[1419]: *** Including module: usrmount *** Jan 23 01:45:31 localhost dracut[1419]: *** Including module: base *** Jan 23 01:45:32 localhost dracut[1419]: *** Including module: fs-lib *** Jan 23 01:45:32 localhost dracut[1419]: *** Including module: kdumpbase *** Jan 23 01:45:32 localhost dracut[1419]: *** Including module: microcode_ctl-fw_dir_override *** Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl module: mangling fw_dir Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: configuration "intel" is ignored Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: configuration "intel-06-2d-07" is ignored Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: configuration "intel-06-4e-03" is ignored Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: configuration "intel-06-4f-01" is ignored Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: configuration "intel-06-55-04" is ignored Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: configuration "intel-06-5e-03" is ignored Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: configuration "intel-06-8c-01" is ignored Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Jan 23 01:45:32 localhost dracut[1419]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Jan 23 01:45:32 localhost dracut[1419]: *** Including module: shutdown *** Jan 23 01:45:32 localhost dracut[1419]: *** Including module: squash *** Jan 23 01:45:32 localhost dracut[1419]: *** Including modules done *** Jan 23 01:45:32 localhost dracut[1419]: *** Installing kernel module dependencies *** Jan 23 01:45:33 localhost dracut[1419]: *** Installing kernel module dependencies done *** Jan 23 01:45:33 localhost dracut[1419]: *** Resolving executable dependencies *** Jan 23 01:45:34 localhost dracut[1419]: *** Resolving executable dependencies done *** Jan 23 01:45:34 localhost dracut[1419]: *** Hardlinking files *** Jan 23 01:45:34 localhost dracut[1419]: Mode: real Jan 23 01:45:34 localhost dracut[1419]: Files: 1099 Jan 23 01:45:34 localhost dracut[1419]: Linked: 3 files Jan 23 01:45:34 localhost dracut[1419]: Compared: 0 xattrs Jan 23 01:45:34 localhost dracut[1419]: Compared: 373 files Jan 23 01:45:34 localhost dracut[1419]: Saved: 61.04 KiB Jan 23 01:45:34 localhost dracut[1419]: Duration: 0.026927 seconds Jan 23 01:45:34 localhost dracut[1419]: *** Hardlinking files done *** Jan 23 01:45:34 localhost dracut[1419]: Could not find 'strip'. Not stripping the initramfs. Jan 23 01:45:34 localhost dracut[1419]: *** Generating early-microcode cpio image *** Jan 23 01:45:34 localhost dracut[1419]: *** Constructing AuthenticAMD.bin *** Jan 23 01:45:34 localhost dracut[1419]: *** Store current command line parameters *** Jan 23 01:45:34 localhost dracut[1419]: Stored kernel commandline: Jan 23 01:45:34 localhost dracut[1419]: No dracut internal kernel commandline stored in the initramfs Jan 23 01:45:35 localhost dracut[1419]: *** Install squash loader *** Jan 23 01:45:35 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 01:45:35 localhost dracut[1419]: *** Squashing the files inside the initramfs *** Jan 23 01:45:36 localhost dracut[1419]: *** Squashing the files inside the initramfs done *** Jan 23 01:45:36 localhost dracut[1419]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Jan 23 01:45:36 localhost dracut[1419]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Jan 23 01:45:37 localhost kdumpctl[1132]: kdump: kexec: loaded kdump kernel Jan 23 01:45:37 localhost kdumpctl[1132]: kdump: Starting kdump: [OK] Jan 23 01:45:37 localhost systemd[1]: Finished Crash recovery kernel arming. Jan 23 01:45:37 localhost systemd[1]: Startup finished in 1.320s (kernel) + 2.122s (initrd) + 15.112s (userspace) = 18.556s. Jan 23 01:45:47 localhost sshd[4170]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:48 localhost systemd[1]: Created slice User Slice of UID 1000. Jan 23 01:45:48 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Jan 23 01:45:48 localhost systemd-logind[764]: New session 1 of user zuul. Jan 23 01:45:48 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Jan 23 01:45:48 localhost systemd[1]: Starting User Manager for UID 1000... Jan 23 01:45:48 localhost systemd[4174]: Queued start job for default target Main User Target. Jan 23 01:45:48 localhost systemd[4174]: Created slice User Application Slice. Jan 23 01:45:48 localhost systemd[4174]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 01:45:48 localhost systemd[4174]: Started Daily Cleanup of User's Temporary Directories. Jan 23 01:45:48 localhost systemd[4174]: Reached target Paths. Jan 23 01:45:48 localhost systemd[4174]: Reached target Timers. Jan 23 01:45:48 localhost systemd[4174]: Starting D-Bus User Message Bus Socket... Jan 23 01:45:48 localhost systemd[4174]: Starting Create User's Volatile Files and Directories... Jan 23 01:45:48 localhost systemd[4174]: Finished Create User's Volatile Files and Directories. Jan 23 01:45:48 localhost systemd[4174]: Listening on D-Bus User Message Bus Socket. Jan 23 01:45:48 localhost systemd[4174]: Reached target Sockets. Jan 23 01:45:48 localhost systemd[4174]: Reached target Basic System. Jan 23 01:45:48 localhost systemd[4174]: Reached target Main User Target. Jan 23 01:45:48 localhost systemd[4174]: Startup finished in 107ms. Jan 23 01:45:48 localhost systemd[1]: Started User Manager for UID 1000. Jan 23 01:45:48 localhost systemd[1]: Started Session 1 of User zuul. Jan 23 01:45:48 localhost python3[4226]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:45:55 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 01:45:56 localhost python3[4247]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:46:04 localhost python3[4300]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:46:05 localhost python3[4331]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Jan 23 01:46:08 localhost python3[4347]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:09 localhost python3[4361]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:10 localhost python3[4420]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:10 localhost python3[4461]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769150770.142464-347-45599336995371/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa follow=False checksum=332ac6e5e102fad0efb63e7711468addf4cebb64 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:12 localhost python3[4534]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:12 localhost python3[4575]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769150771.926334-445-124131780630174/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa.pub follow=False checksum=a2dfb4df29ea2fda7d7e4b28a63ca08610edd25d backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:15 localhost python3[4603]: ansible-ping Invoked with data=pong Jan 23 01:46:16 localhost python3[4617]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:46:21 localhost python3[4670]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Jan 23 01:46:23 localhost python3[4692]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:23 localhost python3[4706]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:23 localhost python3[4720]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:25 localhost python3[4734]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:25 localhost python3[4748]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:25 localhost python3[4762]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:28 localhost python3[4778]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:29 localhost python3[4826]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:29 localhost python3[4869]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1769150789.0504751-58-144882543952752/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:31 localhost python3[4897]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:31 localhost python3[4911]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:31 localhost python3[4925]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4939]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4953]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4967]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4981]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[4995]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[5009]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[5023]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[5037]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5051]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5065]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5079]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5093]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5107]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5121]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5135]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5149]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5163]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5177]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5191]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5205]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5219]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5233]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5247]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:45 localhost python3[5265]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Jan 23 01:46:45 localhost systemd[1]: Starting Time & Date Service... Jan 23 01:46:46 localhost systemd[1]: Started Time & Date Service. Jan 23 01:46:46 localhost systemd-timedated[5267]: Changed time zone to 'UTC' (UTC). Jan 23 01:46:48 localhost python3[5287]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:49 localhost python3[5333]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:50 localhost python3[5374]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1769150809.5217252-455-197170469059410/source _original_basename=tmpg8rif8rx follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:51 localhost python3[5434]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:51 localhost python3[5475]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1769150811.1138065-544-35453341625862/source _original_basename=tmpcsvfne20 follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:53 localhost python3[5537]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:53 localhost python3[5580]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1769150813.077234-688-244904380327499/source _original_basename=tmprwkl79me follow=False checksum=2e193f101b911db5e638a5fc33120ba1c99c8f88 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:55 localhost python3[5609]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:46:55 localhost python3[5625]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:46:56 localhost python3[5675]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:56 localhost python3[5718]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1769150816.37852-814-77488673660376/source _original_basename=tmp2eo5fmz9 follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:58 localhost python3[5749]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163ec2-ffbe-a2b6-1805-000000000023-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:47:00 localhost python3[5767]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a2b6-1805-000000000024-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 23 01:47:02 localhost python3[5785]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:47:16 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Jan 23 01:47:24 localhost python3[5805]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:48:12 localhost systemd[4174]: Starting Mark boot as successful... Jan 23 01:48:12 localhost systemd[4174]: Finished Mark boot as successful. Jan 23 01:48:24 localhost systemd-logind[764]: Session 1 logged out. Waiting for processes to exit. Jan 23 01:49:25 localhost systemd[1]: Unmounting EFI System Partition Automount... Jan 23 01:49:25 localhost systemd[1]: efi.mount: Deactivated successfully. Jan 23 01:49:25 localhost systemd[1]: Unmounted EFI System Partition Automount. Jan 23 01:50:08 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Jan 23 01:50:08 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Jan 23 01:50:08 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Jan 23 01:50:08 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Jan 23 01:50:08 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Jan 23 01:50:08 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Jan 23 01:50:08 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Jan 23 01:50:08 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Jan 23 01:50:08 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Jan 23 01:50:08 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6013] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Jan 23 01:50:08 localhost systemd-udevd[5812]: Network interface NamePolicy= disabled on kernel command line. Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6139] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6159] settings: (eth1): created default wired connection 'Wired connection 1' Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6161] device (eth1): carrier: link connected Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6163] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6166] policy: auto-activating connection 'Wired connection 1' (82aefaba-a294-3143-a2e1-740e972c9550) Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6169] device (eth1): Activation: starting connection 'Wired connection 1' (82aefaba-a294-3143-a2e1-740e972c9550) Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6169] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6171] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6175] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Jan 23 01:50:08 localhost NetworkManager[789]: [1769151008.6177] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:50:09 localhost sshd[5814]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:50:09 localhost systemd-logind[764]: New session 3 of user zuul. Jan 23 01:50:09 localhost systemd[1]: Started Session 3 of User zuul. Jan 23 01:50:09 localhost python3[5831]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163ec2-ffbe-a5a1-fbdc-00000000032e-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:50:09 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Jan 23 01:50:22 localhost python3[5881]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:50:22 localhost python3[5924]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769151022.338081-384-103937245165657/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=02f756362e2232efb8bdb7bb4fa91fedd5263afd backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:50:23 localhost python3[5954]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 01:50:24 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Jan 23 01:50:24 localhost systemd[1]: Stopped Network Manager Wait Online. Jan 23 01:50:24 localhost systemd[1]: Stopping Network Manager Wait Online... Jan 23 01:50:24 localhost NetworkManager[789]: [1769151024.5512] caught SIGTERM, shutting down normally. Jan 23 01:50:24 localhost systemd[1]: Stopping Network Manager... Jan 23 01:50:24 localhost NetworkManager[789]: [1769151024.5592] dhcp4 (eth0): canceled DHCP transaction Jan 23 01:50:24 localhost NetworkManager[789]: [1769151024.5593] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:50:24 localhost NetworkManager[789]: [1769151024.5593] dhcp4 (eth0): state changed no lease Jan 23 01:50:24 localhost NetworkManager[789]: [1769151024.5596] manager: NetworkManager state is now CONNECTING Jan 23 01:50:24 localhost NetworkManager[789]: [1769151024.5673] dhcp4 (eth1): canceled DHCP transaction Jan 23 01:50:24 localhost NetworkManager[789]: [1769151024.5674] dhcp4 (eth1): state changed no lease Jan 23 01:50:24 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 01:50:24 localhost NetworkManager[789]: [1769151024.5739] exiting (success) Jan 23 01:50:24 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 01:50:24 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Jan 23 01:50:24 localhost systemd[1]: Stopped Network Manager. Jan 23 01:50:24 localhost systemd[1]: NetworkManager.service: Consumed 1.557s CPU time. Jan 23 01:50:24 localhost systemd[1]: Starting Network Manager... Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.6337] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:11c5c5c1-9331-4af7-b795-6213ce5ad7a0) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.6339] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Jan 23 01:50:24 localhost systemd[1]: Started Network Manager. Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.6361] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Jan 23 01:50:24 localhost systemd[1]: Starting Network Manager Wait Online... Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.6408] manager[0x55c00e1a8090]: monitoring kernel firmware directory '/lib/firmware'. Jan 23 01:50:24 localhost systemd[1]: Starting Hostname Service... Jan 23 01:50:24 localhost systemd[1]: Started Hostname Service. Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7075] hostname: hostname: using hostnamed Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7076] hostname: static hostname changed from (none) to "np0005593103.novalocal" Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7080] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7086] manager[0x55c00e1a8090]: rfkill: Wi-Fi hardware radio set enabled Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7086] manager[0x55c00e1a8090]: rfkill: WWAN hardware radio set enabled Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7113] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7113] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7114] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7114] manager: Networking is enabled by state file Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7119] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7120] settings: Loaded settings plugin: keyfile (internal) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7150] dhcp: init: Using DHCP client 'internal' Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7153] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7157] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7161] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7168] device (lo): Activation: starting connection 'lo' (a4dde0e0-23aa-447c-a7f4-3f0d7aa6442a) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7173] device (eth0): carrier: link connected Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7177] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7181] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7181] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7187] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7195] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7200] device (eth1): carrier: link connected Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7204] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7210] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (82aefaba-a294-3143-a2e1-740e972c9550) (indicated) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7210] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7215] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7221] device (eth1): Activation: starting connection 'Wired connection 1' (82aefaba-a294-3143-a2e1-740e972c9550) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7240] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7245] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7248] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7251] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7254] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7256] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7259] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7263] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7270] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7273] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7284] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7287] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7320] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7325] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7331] device (lo): Activation: successful, device activated. Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7369] dhcp4 (eth0): state changed new lease, address=38.102.83.132 Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7373] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7438] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7479] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7480] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7484] manager: NetworkManager state is now CONNECTED_SITE Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7486] device (eth0): Activation: successful, device activated. Jan 23 01:50:24 localhost NetworkManager[5968]: [1769151024.7490] manager: NetworkManager state is now CONNECTED_GLOBAL Jan 23 01:50:24 localhost python3[6034]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163ec2-ffbe-a5a1-fbdc-000000000115-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:50:34 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 01:50:54 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 01:51:09 localhost NetworkManager[5968]: [1769151069.7460] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Jan 23 01:51:09 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 01:51:09 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 01:51:09 localhost NetworkManager[5968]: [1769151069.7655] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Jan 23 01:51:09 localhost NetworkManager[5968]: [1769151069.7659] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Jan 23 01:51:09 localhost NetworkManager[5968]: [1769151069.7672] device (eth1): Activation: successful, device activated. Jan 23 01:51:09 localhost NetworkManager[5968]: [1769151069.7680] manager: startup complete Jan 23 01:51:09 localhost systemd[1]: Finished Network Manager Wait Online. Jan 23 01:51:12 localhost systemd[4174]: Created slice User Background Tasks Slice. Jan 23 01:51:12 localhost systemd[4174]: Starting Cleanup of User's Temporary Files and Directories... Jan 23 01:51:12 localhost systemd[4174]: Finished Cleanup of User's Temporary Files and Directories. Jan 23 01:51:19 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 01:51:25 localhost systemd[1]: session-3.scope: Deactivated successfully. Jan 23 01:51:25 localhost systemd[1]: session-3.scope: Consumed 1.409s CPU time. Jan 23 01:51:25 localhost systemd-logind[764]: Session 3 logged out. Waiting for processes to exit. Jan 23 01:51:25 localhost systemd-logind[764]: Removed session 3. Jan 23 01:51:36 localhost sshd[6058]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:53:04 localhost sshd[6060]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:53:04 localhost systemd-logind[764]: New session 4 of user zuul. Jan 23 01:53:04 localhost systemd[1]: Started Session 4 of User zuul. Jan 23 01:53:04 localhost python3[6111]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:53:05 localhost python3[6154]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1769151184.6460247-628-187007276603647/source _original_basename=tmp2ptenhzo follow=False checksum=3cd9da767fb0a14eec4f313122c38d87bc876a69 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:53:10 localhost systemd[1]: session-4.scope: Deactivated successfully. Jan 23 01:53:10 localhost systemd-logind[764]: Session 4 logged out. Waiting for processes to exit. Jan 23 01:53:10 localhost systemd-logind[764]: Removed session 4. Jan 23 01:59:00 localhost sshd[6172]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:59:00 localhost systemd-logind[764]: New session 5 of user zuul. Jan 23 01:59:00 localhost systemd[1]: Started Session 5 of User zuul. Jan 23 01:59:00 localhost python3[6191]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-7446-e1de-000000002191-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:01 localhost python3[6210]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:02 localhost python3[6226]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:02 localhost python3[6242]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:02 localhost python3[6258]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:04 localhost python3[6274]: ansible-ansible.builtin.file Invoked with path=/etc/systemd/system.conf.d state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:04 localhost python3[6322]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system.conf.d/override.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:59:05 localhost python3[6365]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system.conf.d/override.conf mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1769151544.656697-616-214499180954914/source _original_basename=tmpac1_913z follow=False checksum=a05098bd3d2321238ea1169d0e6f135b35b392d4 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:06 localhost python3[6395]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Jan 23 01:59:07 localhost systemd[1]: Reloading. Jan 23 01:59:07 localhost systemd-rc-local-generator[6413]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 01:59:07 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 01:59:08 localhost python3[6442]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Jan 23 01:59:09 localhost python3[6458]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:09 localhost python3[6476]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:09 localhost python3[6494]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:10 localhost python3[6512]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:12 localhost python3[6529]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-7446-e1de-000000002198-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:12 localhost python3[6549]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 01:59:15 localhost systemd[1]: session-5.scope: Deactivated successfully. Jan 23 01:59:15 localhost systemd[1]: session-5.scope: Consumed 4.036s CPU time. Jan 23 01:59:15 localhost systemd-logind[764]: Session 5 logged out. Waiting for processes to exit. Jan 23 01:59:15 localhost systemd-logind[764]: Removed session 5. Jan 23 02:00:16 localhost sshd[6555]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:00:16 localhost systemd-logind[764]: New session 6 of user zuul. Jan 23 02:00:16 localhost systemd[1]: Started Session 6 of User zuul. Jan 23 02:00:16 localhost systemd[1]: Starting RHSM dbus service... Jan 23 02:00:17 localhost systemd[1]: Started RHSM dbus service. Jan 23 02:00:17 localhost rhsm-service[6579]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:17 localhost rhsm-service[6579]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:17 localhost rhsm-service[6579]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:17 localhost rhsm-service[6579]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:23 localhost rhsm-service[6579]: INFO [subscription_manager.managerlib:90] Consumer created: np0005593103.novalocal (23fed67b-eb77-454b-94cb-5ed48a526b11) Jan 23 02:00:23 localhost subscription-manager[6579]: Registered system with identity: 23fed67b-eb77-454b-94cb-5ed48a526b11 Jan 23 02:00:23 localhost systemd[1]: Starting Cleanup of Temporary Directories... Jan 23 02:00:23 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Jan 23 02:00:23 localhost systemd[1]: Finished Cleanup of Temporary Directories. Jan 23 02:00:23 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Jan 23 02:00:31 localhost rhsm-service[6579]: INFO [subscription_manager.entcertlib:131] certs updated: Jan 23 02:00:31 localhost rhsm-service[6579]: Total updates: 1 Jan 23 02:00:31 localhost rhsm-service[6579]: Found (local) serial# [] Jan 23 02:00:31 localhost rhsm-service[6579]: Expected (UEP) serial# [8996690878078849686] Jan 23 02:00:31 localhost rhsm-service[6579]: Added (new) Jan 23 02:00:31 localhost rhsm-service[6579]: [sn:8996690878078849686 ( Content Access,) @ /etc/pki/entitlement/8996690878078849686.pem] Jan 23 02:00:31 localhost rhsm-service[6579]: Deleted (rogue): Jan 23 02:00:31 localhost rhsm-service[6579]: Jan 23 02:00:31 localhost subscription-manager[6579]: Added subscription for 'Content Access' contract 'None' Jan 23 02:00:31 localhost subscription-manager[6579]: Added subscription for product ' Content Access' Jan 23 02:00:38 localhost rhsm-service[6579]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:38 localhost rhsm-service[6579]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:39 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:41 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:41 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:42 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:42 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:50 localhost python3[6672]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-520e-60b7-00000000000d-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:01:01 localhost python3[6691]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:01:32 localhost setsebool[6782]: The virt_use_nfs policy boolean was changed to 1 by root Jan 23 02:01:32 localhost setsebool[6782]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Jan 23 02:01:41 localhost kernel: SELinux: Converting 408 SID table entries... Jan 23 02:01:41 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:01:41 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:01:53 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=3 res=1 Jan 23 02:01:53 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:01:53 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:01:53 localhost systemd[1]: Reloading. Jan 23 02:01:53 localhost systemd-rc-local-generator[7653]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:01:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:01:53 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:01:54 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:02:01 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:02:01 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:02:01 localhost systemd[1]: man-db-cache-update.service: Consumed 9.995s CPU time. Jan 23 02:02:01 localhost systemd[1]: run-rb9b3fa42130842deb6f25e0a042f8771.service: Deactivated successfully. Jan 23 02:02:48 localhost podman[18376]: 2026-01-23 07:02:48.626683278 +0000 UTC m=+0.074761553 system refresh Jan 23 02:02:49 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 02:02:49 localhost systemd[4174]: Starting D-Bus User Message Bus... Jan 23 02:02:49 localhost dbus-broker-launch[18435]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Jan 23 02:02:49 localhost dbus-broker-launch[18435]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Jan 23 02:02:49 localhost systemd[4174]: Started D-Bus User Message Bus. Jan 23 02:02:49 localhost journal[18435]: Ready Jan 23 02:02:49 localhost systemd[4174]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Jan 23 02:02:49 localhost systemd[4174]: Created slice Slice /user. Jan 23 02:02:49 localhost systemd[4174]: podman-18418.scope: unit configures an IP firewall, but not running as root. Jan 23 02:02:49 localhost systemd[4174]: (This warning is only shown for the first unit using IP firewalling.) Jan 23 02:02:49 localhost systemd[4174]: Started podman-18418.scope. Jan 23 02:02:50 localhost systemd[4174]: Started podman-pause-c5f12e3a.scope. Jan 23 02:02:52 localhost systemd[1]: session-6.scope: Deactivated successfully. Jan 23 02:02:52 localhost systemd[1]: session-6.scope: Consumed 49.800s CPU time. Jan 23 02:02:52 localhost systemd-logind[764]: Session 6 logged out. Waiting for processes to exit. Jan 23 02:02:52 localhost systemd-logind[764]: Removed session 6. Jan 23 02:03:07 localhost sshd[18439]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18441]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18442]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18440]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18443]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:14 localhost sshd[18449]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:14 localhost systemd-logind[764]: New session 7 of user zuul. Jan 23 02:03:14 localhost systemd[1]: Started Session 7 of User zuul. Jan 23 02:03:14 localhost python3[18466]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBInV8xbfwZCtixFfnaF+5335WSj2PPYn9+xcf0/XxAeXNy37BWyB6Z08AP77XEzDpqv4jTzIwdAdQ5f/jZPqrA= zuul@np0005593098.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:03:15 localhost python3[18482]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBInV8xbfwZCtixFfnaF+5335WSj2PPYn9+xcf0/XxAeXNy37BWyB6Z08AP77XEzDpqv4jTzIwdAdQ5f/jZPqrA= zuul@np0005593098.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:03:18 localhost systemd[1]: session-7.scope: Deactivated successfully. Jan 23 02:03:18 localhost systemd-logind[764]: Session 7 logged out. Waiting for processes to exit. Jan 23 02:03:18 localhost systemd-logind[764]: Removed session 7. Jan 23 02:04:46 localhost sshd[18485]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:04:47 localhost systemd-logind[764]: New session 8 of user zuul. Jan 23 02:04:47 localhost systemd[1]: Started Session 8 of User zuul. Jan 23 02:04:47 localhost python3[18504]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDA22S1/hH+74ZumLmJ/jHPUBPUomvGp3s6RqnOgAdA7cefJomWVOgkqwlIoxK5FTcArrD88mi9sN+lvzN/kGGPgykDsWzPpE9b4way9UPOaDSLS04NNjNF7tr+BuHrN6LIUkYCWLs3icRmrwYU2v6dkBelWRDqyHXucSgfvBPJxUU9/01SjH0DQu0XkkKS+xqKi8AcUdmj7ZW/5Ep/v7R8xdZNDwvG67wt0sgMSmVqVP0qfeU8Yi0cLZ65R1eMSD8dwMfsDi/s5qP/FALaWGZZlTqzronkoY3LH5RIbNnqGd28182cfxXDod4kAS2vbyzUYyYdRja0QCp29mgD4AV8WO4HYj5hJ4CrXz1UfDeBqsOKxEzgD8An+1jSdyh39tjsSCMG4j2Zp6s4SjmkEKix1MXqp7578FrwHzVM4K9kOXf1xqlzHLv/dLdfPIw2EOHM/kyCHdHKDVUaH1DFVBF0ZyrN57RFJvEoiw3RgfyDhzZK6hIMyNXDqGQ45hLVjOE= zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:04:48 localhost python3[18520]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005593103.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Jan 23 02:04:49 localhost python3[18570]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:49 localhost python3[18613]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769151889.1263072-93-64470769954245/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa follow=False checksum=332ac6e5e102fad0efb63e7711468addf4cebb64 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:51 localhost python3[18675]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:51 localhost python3[18718]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769151891.0795252-184-198232187721761/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa.pub follow=False checksum=a2dfb4df29ea2fda7d7e4b28a63ca08610edd25d backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:54 localhost python3[18748]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:55 localhost python3[18794]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:55 localhost python3[18810]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmphs_dycnq recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:56 localhost python3[18870]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:56 localhost python3[18886]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmp0uu8j3lx recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:58 localhost python3[18946]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:58 localhost python3[18962]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmpcfj35qv6 recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:59 localhost systemd-logind[764]: Session 8 logged out. Waiting for processes to exit. Jan 23 02:04:59 localhost systemd[1]: session-8.scope: Deactivated successfully. Jan 23 02:04:59 localhost systemd[1]: session-8.scope: Consumed 3.516s CPU time. Jan 23 02:04:59 localhost systemd-logind[764]: Removed session 8. Jan 23 02:07:17 localhost sshd[18979]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:07:17 localhost systemd-logind[764]: New session 9 of user zuul. Jan 23 02:07:17 localhost systemd[1]: Started Session 9 of User zuul. Jan 23 02:07:18 localhost python3[19025]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:11:04 localhost sshd[19027]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:12:18 localhost systemd[1]: session-9.scope: Deactivated successfully. Jan 23 02:12:18 localhost systemd-logind[764]: Session 9 logged out. Waiting for processes to exit. Jan 23 02:12:18 localhost systemd-logind[764]: Removed session 9. Jan 23 02:15:12 localhost systemd[1]: Starting dnf makecache... Jan 23 02:15:12 localhost dnf[19032]: Updating Subscription Management repositories. Jan 23 02:15:14 localhost dnf[19032]: Failed determining last makecache time. Jan 23 02:15:14 localhost dnf[19032]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 59 kB/s | 4.5 kB 00:00 Jan 23 02:15:14 localhost dnf[19032]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 47 kB/s | 4.1 kB 00:00 Jan 23 02:15:14 localhost dnf[19032]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 54 kB/s | 4.5 kB 00:00 Jan 23 02:15:14 localhost dnf[19032]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 48 kB/s | 4.1 kB 00:00 Jan 23 02:15:15 localhost dnf[19032]: Metadata cache created. Jan 23 02:15:15 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Jan 23 02:15:15 localhost systemd[1]: Finished dnf makecache. Jan 23 02:15:15 localhost systemd[1]: dnf-makecache.service: Consumed 2.552s CPU time. Jan 23 02:17:42 localhost sshd[19037]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:19:08 localhost sshd[19040]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:19:09 localhost systemd-logind[764]: New session 10 of user zuul. Jan 23 02:19:09 localhost systemd[1]: Started Session 10 of User zuul. Jan 23 02:19:09 localhost python3[19057]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000000c-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:19:10 localhost python3[19077]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000000d-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:19:15 localhost python3[19096]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Jan 23 02:19:18 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:19:18 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:12 localhost python3[19255]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Jan 23 02:20:14 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:14 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:22 localhost python3[19396]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Jan 23 02:20:25 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:25 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:28 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:33 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:50 localhost python3[19967]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Jan 23 02:20:53 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:58 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:59 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:20 localhost python3[20302]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Jan 23 02:21:22 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:23 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:28 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:49 localhost python3[20639]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000013-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:21:55 localhost python3[20658]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:22:08 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Jan 23 02:22:17 localhost kernel: SELinux: Converting 501 SID table entries... Jan 23 02:22:18 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:22:18 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:22:18 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:22:18 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:22:18 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:22:18 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:22:18 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:22:20 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=4 res=1 Jan 23 02:22:20 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:22:20 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:22:20 localhost systemd[1]: Reloading. Jan 23 02:22:20 localhost systemd-rc-local-generator[21316]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:22:20 localhost systemd-sysv-generator[21320]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:22:20 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:22:20 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:22:21 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:22:21 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:22:21 localhost systemd[1]: run-r90b49127869d4b28b5122c1aebb13d74.service: Deactivated successfully. Jan 23 02:22:21 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:22:21 localhost rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:22:47 localhost python3[21916]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000015-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:23:15 localhost python3[21936]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:23:15 localhost python3[21984]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:23:16 localhost python3[22027]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769152995.5945432-289-86282544532805/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=aed8e312f8ee66e212b5f9a6cd551423fddc0577 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:23:17 localhost python3[22057]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:17 localhost systemd-journald[618]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 89.2 (297 of 333 items), suggesting rotation. Jan 23 02:23:17 localhost systemd-journald[618]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 02:23:17 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:23:17 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:23:17 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:23:18 localhost python3[22078]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:18 localhost python3[22098]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:18 localhost python3[22118]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:18 localhost python3[22138]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:21 localhost python3[22158]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 02:23:21 localhost systemd[1]: Starting LSB: Bring up/down networking... Jan 23 02:23:21 localhost network[22161]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Jan 23 02:23:21 localhost network[22172]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Jan 23 02:23:21 localhost network[22161]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:21 localhost network[22173]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:21 localhost network[22161]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Jan 23 02:23:21 localhost network[22174]: It is advised to switch to 'NetworkManager' instead for network management. Jan 23 02:23:21 localhost NetworkManager[5968]: [1769153001.4316] audit: op="connections-reload" pid=22202 uid=0 result="success" Jan 23 02:23:21 localhost network[22161]: Bringing up loopback interface: [ OK ] Jan 23 02:23:21 localhost NetworkManager[5968]: [1769153001.6394] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=22290 uid=0 result="success" Jan 23 02:23:21 localhost network[22161]: Bringing up interface eth0: [ OK ] Jan 23 02:23:21 localhost systemd[1]: Started LSB: Bring up/down networking. Jan 23 02:23:22 localhost python3[22331]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch Database Unit... Jan 23 02:23:22 localhost chown[22335]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Jan 23 02:23:22 localhost ovs-ctl[22340]: /etc/openvswitch/conf.db does not exist ... (warning). Jan 23 02:23:22 localhost ovs-ctl[22340]: Creating empty database /etc/openvswitch/conf.db [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22340]: Starting ovsdb-server [ OK ] Jan 23 02:23:22 localhost ovs-vsctl[22389]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Jan 23 02:23:22 localhost ovs-vsctl[22409]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.6-141.el9fdp "external-ids:system-id=\"6e1c6c1a-0e36-42c5-b99e-70eac6da84f1\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Jan 23 02:23:22 localhost ovs-ctl[22340]: Configuring Open vSwitch system IDs [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22340]: Enabling remote OVSDB managers [ OK ] Jan 23 02:23:22 localhost systemd[1]: Started Open vSwitch Database Unit. Jan 23 02:23:22 localhost ovs-vsctl[22415]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005593103.novalocal Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Jan 23 02:23:22 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Jan 23 02:23:22 localhost kernel: openvswitch: Open vSwitch switching datapath Jan 23 02:23:22 localhost ovs-ctl[22459]: Inserting openvswitch module [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22428]: Starting ovs-vswitchd [ OK ] Jan 23 02:23:22 localhost ovs-vsctl[22478]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005593103.novalocal Jan 23 02:23:22 localhost ovs-ctl[22428]: Enabling remote OVSDB managers [ OK ] Jan 23 02:23:22 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch... Jan 23 02:23:22 localhost systemd[1]: Finished Open vSwitch. Jan 23 02:23:26 localhost python3[22496]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000001a-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:23:27 localhost NetworkManager[5968]: [1769153007.0381] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22654 uid=0 result="success" Jan 23 02:23:27 localhost ifup[22655]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:27 localhost ifup[22656]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:27 localhost ifup[22657]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:27 localhost NetworkManager[5968]: [1769153007.0717] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22663 uid=0 result="success" Jan 23 02:23:27 localhost ovs-vsctl[22665]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:79:ee:fa -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Jan 23 02:23:27 localhost kernel: device ovs-system entered promiscuous mode Jan 23 02:23:27 localhost NetworkManager[5968]: [1769153007.1004] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Jan 23 02:23:27 localhost systemd-udevd[22667]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:27 localhost kernel: Timeout policy base is empty Jan 23 02:23:27 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Jan 23 02:23:27 localhost kernel: device br-ex entered promiscuous mode Jan 23 02:23:27 localhost systemd-udevd[22680]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:27 localhost NetworkManager[5968]: [1769153007.1458] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Jan 23 02:23:27 localhost NetworkManager[5968]: [1769153007.1730] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22693 uid=0 result="success" Jan 23 02:23:27 localhost NetworkManager[5968]: [1769153007.1942] device (br-ex): carrier: link connected Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.2492] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22722 uid=0 result="success" Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.3004] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22737 uid=0 result="success" Jan 23 02:23:30 localhost NET[22762]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.3987] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.4062] dhcp4 (eth1): canceled DHCP transaction Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.4063] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.4063] dhcp4 (eth1): state changed no lease Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.4103] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22771 uid=0 result="success" Jan 23 02:23:30 localhost ifup[22772]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:30 localhost ifup[22773]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:30 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 02:23:30 localhost ifup[22775]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:30 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.4441] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22786 uid=0 result="success" Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.4923] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22799 uid=0 result="success" Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.4995] device (eth1): carrier: link connected Jan 23 02:23:30 localhost NetworkManager[5968]: [1769153010.5234] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22808 uid=0 result="success" Jan 23 02:23:30 localhost ipv6_wait_tentative[22820]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Jan 23 02:23:31 localhost NetworkManager[5968]: [1769153011.5831] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22828 uid=0 result="success" Jan 23 02:23:31 localhost ovs-vsctl[22843]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Jan 23 02:23:31 localhost kernel: device eth1 entered promiscuous mode Jan 23 02:23:31 localhost NetworkManager[5968]: [1769153011.6622] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22851 uid=0 result="success" Jan 23 02:23:31 localhost ifup[22852]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:31 localhost ifup[22853]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:31 localhost ifup[22854]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:31 localhost NetworkManager[5968]: [1769153011.6928] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22860 uid=0 result="success" Jan 23 02:23:31 localhost NetworkManager[5968]: [1769153011.7355] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22870 uid=0 result="success" Jan 23 02:23:31 localhost ifup[22871]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:31 localhost ifup[22872]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:31 localhost ifup[22873]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:31 localhost NetworkManager[5968]: [1769153011.7679] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22879 uid=0 result="success" Jan 23 02:23:31 localhost ovs-vsctl[22882]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Jan 23 02:23:31 localhost kernel: device vlan23 entered promiscuous mode Jan 23 02:23:31 localhost NetworkManager[5968]: [1769153011.8151] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Jan 23 02:23:31 localhost systemd-udevd[22884]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:31 localhost NetworkManager[5968]: [1769153011.8452] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22893 uid=0 result="success" Jan 23 02:23:31 localhost NetworkManager[5968]: [1769153011.8692] device (vlan23): carrier: link connected Jan 23 02:23:34 localhost NetworkManager[5968]: [1769153014.9483] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22923 uid=0 result="success" Jan 23 02:23:34 localhost NetworkManager[5968]: [1769153014.9956] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22938 uid=0 result="success" Jan 23 02:23:35 localhost NetworkManager[5968]: [1769153015.0569] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22959 uid=0 result="success" Jan 23 02:23:35 localhost ifup[22960]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:35 localhost ifup[22961]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:35 localhost ifup[22962]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:35 localhost NetworkManager[5968]: [1769153015.0900] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22968 uid=0 result="success" Jan 23 02:23:35 localhost ovs-vsctl[22971]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Jan 23 02:23:35 localhost systemd-udevd[22973]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:35 localhost kernel: device vlan20 entered promiscuous mode Jan 23 02:23:35 localhost NetworkManager[5968]: [1769153015.1345] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Jan 23 02:23:35 localhost NetworkManager[5968]: [1769153015.1611] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22983 uid=0 result="success" Jan 23 02:23:35 localhost NetworkManager[5968]: [1769153015.1838] device (vlan20): carrier: link connected Jan 23 02:23:38 localhost NetworkManager[5968]: [1769153018.2489] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23013 uid=0 result="success" Jan 23 02:23:38 localhost NetworkManager[5968]: [1769153018.2957] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23028 uid=0 result="success" Jan 23 02:23:38 localhost NetworkManager[5968]: [1769153018.3525] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23049 uid=0 result="success" Jan 23 02:23:38 localhost ifup[23050]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:38 localhost ifup[23051]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:38 localhost ifup[23052]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:38 localhost NetworkManager[5968]: [1769153018.3868] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23058 uid=0 result="success" Jan 23 02:23:38 localhost ovs-vsctl[23061]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Jan 23 02:23:38 localhost kernel: device vlan22 entered promiscuous mode Jan 23 02:23:38 localhost systemd-udevd[23063]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:38 localhost NetworkManager[5968]: [1769153018.4597] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Jan 23 02:23:38 localhost NetworkManager[5968]: [1769153018.4862] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23073 uid=0 result="success" Jan 23 02:23:38 localhost NetworkManager[5968]: [1769153018.5102] device (vlan22): carrier: link connected Jan 23 02:23:40 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 02:23:41 localhost NetworkManager[5968]: [1769153021.5640] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23103 uid=0 result="success" Jan 23 02:23:41 localhost NetworkManager[5968]: [1769153021.6108] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23118 uid=0 result="success" Jan 23 02:23:41 localhost NetworkManager[5968]: [1769153021.6714] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23139 uid=0 result="success" Jan 23 02:23:41 localhost ifup[23140]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:41 localhost ifup[23141]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:41 localhost ifup[23142]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:41 localhost NetworkManager[5968]: [1769153021.7036] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23148 uid=0 result="success" Jan 23 02:23:41 localhost ovs-vsctl[23151]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Jan 23 02:23:41 localhost kernel: device vlan21 entered promiscuous mode Jan 23 02:23:41 localhost NetworkManager[5968]: [1769153021.7955] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Jan 23 02:23:41 localhost systemd-udevd[23153]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:41 localhost NetworkManager[5968]: [1769153021.8232] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23163 uid=0 result="success" Jan 23 02:23:41 localhost NetworkManager[5968]: [1769153021.8439] device (vlan21): carrier: link connected Jan 23 02:23:44 localhost NetworkManager[5968]: [1769153024.9084] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23193 uid=0 result="success" Jan 23 02:23:45 localhost NetworkManager[5968]: [1769153025.0023] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23208 uid=0 result="success" Jan 23 02:23:45 localhost NetworkManager[5968]: [1769153025.0595] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23229 uid=0 result="success" Jan 23 02:23:45 localhost ifup[23230]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:45 localhost ifup[23231]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:45 localhost ifup[23232]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:45 localhost NetworkManager[5968]: [1769153025.0886] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23238 uid=0 result="success" Jan 23 02:23:45 localhost ovs-vsctl[23241]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Jan 23 02:23:45 localhost kernel: device vlan44 entered promiscuous mode Jan 23 02:23:45 localhost NetworkManager[5968]: [1769153025.1249] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Jan 23 02:23:45 localhost systemd-udevd[23244]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:45 localhost NetworkManager[5968]: [1769153025.1469] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23253 uid=0 result="success" Jan 23 02:23:45 localhost NetworkManager[5968]: [1769153025.1658] device (vlan44): carrier: link connected Jan 23 02:23:48 localhost NetworkManager[5968]: [1769153028.2192] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23283 uid=0 result="success" Jan 23 02:23:48 localhost NetworkManager[5968]: [1769153028.2731] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23298 uid=0 result="success" Jan 23 02:23:48 localhost NetworkManager[5968]: [1769153028.3285] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23319 uid=0 result="success" Jan 23 02:23:48 localhost ifup[23320]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:48 localhost ifup[23321]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:48 localhost ifup[23322]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:48 localhost NetworkManager[5968]: [1769153028.3630] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23328 uid=0 result="success" Jan 23 02:23:48 localhost ovs-vsctl[23331]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Jan 23 02:23:48 localhost NetworkManager[5968]: [1769153028.4216] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23338 uid=0 result="success" Jan 23 02:23:49 localhost NetworkManager[5968]: [1769153029.4826] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23365 uid=0 result="success" Jan 23 02:23:49 localhost NetworkManager[5968]: [1769153029.5356] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23380 uid=0 result="success" Jan 23 02:23:49 localhost NetworkManager[5968]: [1769153029.5981] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23401 uid=0 result="success" Jan 23 02:23:49 localhost ifup[23402]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:49 localhost ifup[23403]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:49 localhost ifup[23404]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:49 localhost NetworkManager[5968]: [1769153029.6333] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23410 uid=0 result="success" Jan 23 02:23:49 localhost ovs-vsctl[23413]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Jan 23 02:23:49 localhost NetworkManager[5968]: [1769153029.7206] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23420 uid=0 result="success" Jan 23 02:23:50 localhost NetworkManager[5968]: [1769153030.7788] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23448 uid=0 result="success" Jan 23 02:23:50 localhost NetworkManager[5968]: [1769153030.8262] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23463 uid=0 result="success" Jan 23 02:23:50 localhost NetworkManager[5968]: [1769153030.8846] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23484 uid=0 result="success" Jan 23 02:23:50 localhost ifup[23485]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:50 localhost ifup[23486]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:50 localhost ifup[23487]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:50 localhost NetworkManager[5968]: [1769153030.9193] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23493 uid=0 result="success" Jan 23 02:23:50 localhost ovs-vsctl[23496]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Jan 23 02:23:50 localhost NetworkManager[5968]: [1769153030.9790] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23503 uid=0 result="success" Jan 23 02:23:52 localhost NetworkManager[5968]: [1769153032.0431] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23531 uid=0 result="success" Jan 23 02:23:52 localhost NetworkManager[5968]: [1769153032.0919] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23546 uid=0 result="success" Jan 23 02:23:52 localhost NetworkManager[5968]: [1769153032.1605] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23567 uid=0 result="success" Jan 23 02:23:52 localhost ifup[23568]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:52 localhost ifup[23569]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:52 localhost ifup[23570]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:52 localhost NetworkManager[5968]: [1769153032.1917] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23576 uid=0 result="success" Jan 23 02:23:52 localhost ovs-vsctl[23579]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Jan 23 02:23:52 localhost NetworkManager[5968]: [1769153032.2462] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23586 uid=0 result="success" Jan 23 02:23:53 localhost NetworkManager[5968]: [1769153033.3078] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23614 uid=0 result="success" Jan 23 02:23:53 localhost NetworkManager[5968]: [1769153033.3540] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23629 uid=0 result="success" Jan 23 02:23:53 localhost NetworkManager[5968]: [1769153033.4111] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23650 uid=0 result="success" Jan 23 02:23:53 localhost ifup[23651]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:53 localhost ifup[23652]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:53 localhost ifup[23653]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:53 localhost NetworkManager[5968]: [1769153033.4453] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23659 uid=0 result="success" Jan 23 02:23:53 localhost ovs-vsctl[23662]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Jan 23 02:23:53 localhost NetworkManager[5968]: [1769153033.5003] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23669 uid=0 result="success" Jan 23 02:23:54 localhost NetworkManager[5968]: [1769153034.5620] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23697 uid=0 result="success" Jan 23 02:23:54 localhost NetworkManager[5968]: [1769153034.6069] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23712 uid=0 result="success" Jan 23 02:24:48 localhost python3[23744]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000001b-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:24:53 localhost python3[23763]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDA22S1/hH+74ZumLmJ/jHPUBPUomvGp3s6RqnOgAdA7cefJomWVOgkqwlIoxK5FTcArrD88mi9sN+lvzN/kGGPgykDsWzPpE9b4way9UPOaDSLS04NNjNF7tr+BuHrN6LIUkYCWLs3icRmrwYU2v6dkBelWRDqyHXucSgfvBPJxUU9/01SjH0DQu0XkkKS+xqKi8AcUdmj7ZW/5Ep/v7R8xdZNDwvG67wt0sgMSmVqVP0qfeU8Yi0cLZ65R1eMSD8dwMfsDi/s5qP/FALaWGZZlTqzronkoY3LH5RIbNnqGd28182cfxXDod4kAS2vbyzUYyYdRja0QCp29mgD4AV8WO4HYj5hJ4CrXz1UfDeBqsOKxEzgD8An+1jSdyh39tjsSCMG4j2Zp6s4SjmkEKix1MXqp7578FrwHzVM4K9kOXf1xqlzHLv/dLdfPIw2EOHM/kyCHdHKDVUaH1DFVBF0ZyrN57RFJvEoiw3RgfyDhzZK6hIMyNXDqGQ45hLVjOE= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:54 localhost python3[23779]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:56 localhost python3[23793]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDA22S1/hH+74ZumLmJ/jHPUBPUomvGp3s6RqnOgAdA7cefJomWVOgkqwlIoxK5FTcArrD88mi9sN+lvzN/kGGPgykDsWzPpE9b4way9UPOaDSLS04NNjNF7tr+BuHrN6LIUkYCWLs3icRmrwYU2v6dkBelWRDqyHXucSgfvBPJxUU9/01SjH0DQu0XkkKS+xqKi8AcUdmj7ZW/5Ep/v7R8xdZNDwvG67wt0sgMSmVqVP0qfeU8Yi0cLZ65R1eMSD8dwMfsDi/s5qP/FALaWGZZlTqzronkoY3LH5RIbNnqGd28182cfxXDod4kAS2vbyzUYyYdRja0QCp29mgD4AV8WO4HYj5hJ4CrXz1UfDeBqsOKxEzgD8An+1jSdyh39tjsSCMG4j2Zp6s4SjmkEKix1MXqp7578FrwHzVM4K9kOXf1xqlzHLv/dLdfPIw2EOHM/kyCHdHKDVUaH1DFVBF0ZyrN57RFJvEoiw3RgfyDhzZK6hIMyNXDqGQ45hLVjOE= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:56 localhost python3[23809]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:57 localhost python3[23823]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Jan 23 02:24:58 localhost python3[23838]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005593103.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000022-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:24:58 localhost python3[23858]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000023-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:24:58 localhost systemd[1]: Starting Hostname Service... Jan 23 02:24:59 localhost systemd[1]: Started Hostname Service. Jan 23 02:24:59 localhost systemd-hostnamed[23862]: Hostname set to (static) Jan 23 02:24:59 localhost NetworkManager[5968]: [1769153099.0131] hostname: static hostname changed from "np0005593103.novalocal" to "np0005593103.ooo.test" Jan 23 02:24:59 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 02:24:59 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 02:25:00 localhost systemd[1]: session-10.scope: Deactivated successfully. Jan 23 02:25:00 localhost systemd[1]: session-10.scope: Consumed 1min 45.637s CPU time. Jan 23 02:25:00 localhost systemd-logind[764]: Session 10 logged out. Waiting for processes to exit. Jan 23 02:25:00 localhost systemd-logind[764]: Removed session 10. Jan 23 02:25:02 localhost sshd[23873]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:25:02 localhost systemd-logind[764]: New session 11 of user zuul. Jan 23 02:25:02 localhost systemd[1]: Started Session 11 of User zuul. Jan 23 02:25:02 localhost python3[23890]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Jan 23 02:25:05 localhost systemd[1]: session-11.scope: Deactivated successfully. Jan 23 02:25:05 localhost systemd-logind[764]: Session 11 logged out. Waiting for processes to exit. Jan 23 02:25:05 localhost systemd-logind[764]: Removed session 11. Jan 23 02:25:09 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 02:25:29 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 02:25:51 localhost sshd[23896]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:25:52 localhost systemd-logind[764]: New session 12 of user zuul. Jan 23 02:25:52 localhost systemd[1]: Started Session 12 of User zuul. Jan 23 02:25:52 localhost python3[23915]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:26:00 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Jan 23 02:26:00 localhost dbus-broker-launch[18435]: Noticed file-system modification, trigger reload. Jan 23 02:26:00 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Jan 23 02:26:00 localhost dbus-broker-launch[18435]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Jan 23 02:26:00 localhost dbus-broker-launch[18435]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Jan 23 02:26:00 localhost dbus-broker-launch[18435]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Jan 23 02:26:00 localhost systemd[1]: Reloading. Jan 23 02:26:00 localhost systemd-sysv-generator[24017]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:26:00 localhost systemd-rc-local-generator[24013]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:26:00 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:26:00 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Jan 23 02:26:09 localhost kernel: SELinux: Converting 538 SID table entries... Jan 23 02:26:09 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:26:09 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:26:09 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:26:09 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:26:09 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:26:09 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:26:09 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:26:10 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=5 res=1 Jan 23 02:26:10 localhost systemd[1]: Stopping OpenSSH server daemon... Jan 23 02:26:10 localhost systemd[1]: sshd.service: Deactivated successfully. Jan 23 02:26:10 localhost systemd[1]: Stopped OpenSSH server daemon. Jan 23 02:26:10 localhost systemd[1]: sshd.service: Consumed 1.109s CPU time. Jan 23 02:26:10 localhost systemd[1]: Stopped target sshd-keygen.target. Jan 23 02:26:10 localhost systemd[1]: Stopping sshd-keygen.target... Jan 23 02:26:10 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 02:26:10 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 02:26:10 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 02:26:10 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 02:26:10 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 02:26:10 localhost sshd[24051]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:26:10 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 02:26:11 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:26:11 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:26:11 localhost systemd[1]: Reloading. Jan 23 02:26:11 localhost systemd-rc-local-generator[24593]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:26:11 localhost systemd-sysv-generator[24596]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:26:11 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:26:11 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:26:11 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:26:12 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:26:12 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:26:12 localhost systemd[1]: man-db-cache-update.service: Consumed 1.491s CPU time. Jan 23 02:26:12 localhost systemd[1]: run-r050cb3f846674fccbc63ccccd9b33f25.service: Deactivated successfully. Jan 23 02:26:12 localhost systemd[1]: run-r46781d5f0a8d4e0a9abd55960b17842d.service: Deactivated successfully. Jan 23 02:27:12 localhost systemd[1]: session-12.scope: Deactivated successfully. Jan 23 02:27:12 localhost systemd[1]: session-12.scope: Consumed 17.324s CPU time. Jan 23 02:27:12 localhost systemd-logind[764]: Session 12 logged out. Waiting for processes to exit. Jan 23 02:27:12 localhost systemd-logind[764]: Removed session 12. Jan 23 02:27:42 localhost sshd[26016]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:27:42 localhost systemd[1]: Started Session 13 of User zuul. Jan 23 02:27:42 localhost systemd-logind[764]: New session 13 of user zuul. Jan 23 02:27:43 localhost python3[26067]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:27:43 localhost python3[26112]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769153262.9020727-62-263631386188801/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:27:47 localhost python3[26142]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:27:49 localhost python3[26160]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:28:49 localhost systemd[1]: session-13.scope: Deactivated successfully. Jan 23 02:28:49 localhost systemd[1]: session-13.scope: Consumed 1.186s CPU time. Jan 23 02:28:49 localhost systemd-logind[764]: Session 13 logged out. Waiting for processes to exit. Jan 23 02:28:49 localhost systemd-logind[764]: Removed session 13. Jan 23 02:47:12 localhost sshd[26164]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:55:55 localhost sshd[26171]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:55:56 localhost systemd-logind[764]: New session 14 of user zuul. Jan 23 02:55:56 localhost systemd[1]: Started Session 14 of User zuul. Jan 23 02:55:56 localhost python3[26219]: ansible-ansible.legacy.ping Invoked with data=pong Jan 23 02:55:57 localhost python3[26264]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 02:55:57 localhost python3[26284]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005593103.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Jan 23 02:55:58 localhost systemd-journald[618]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Jan 23 02:55:58 localhost systemd-journald[618]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 02:55:58 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:55:58 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:55:58 localhost python3[26343]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:55:59 localhost python3[26386]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1769154958.392841-81441-242231665035405/source _original_basename=tmph1te6c1p follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:55:59 localhost python3[26416]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:00 localhost python3[26432]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:00 localhost python3[26448]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:01 localhost python3[26464]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDA22S1/hH+74ZumLmJ/jHPUBPUomvGp3s6RqnOgAdA7cefJomWVOgkqwlIoxK5FTcArrD88mi9sN+lvzN/kGGPgykDsWzPpE9b4way9UPOaDSLS04NNjNF7tr+BuHrN6LIUkYCWLs3icRmrwYU2v6dkBelWRDqyHXucSgfvBPJxUU9/01SjH0DQu0XkkKS+xqKi8AcUdmj7ZW/5Ep/v7R8xdZNDwvG67wt0sgMSmVqVP0qfeU8Yi0cLZ65R1eMSD8dwMfsDi/s5qP/FALaWGZZlTqzronkoY3LH5RIbNnqGd28182cfxXDod4kAS2vbyzUYyYdRja0QCp29mgD4AV8WO4HYj5hJ4CrXz1UfDeBqsOKxEzgD8An+1jSdyh39tjsSCMG4j2Zp6s4SjmkEKix1MXqp7578FrwHzVM4K9kOXf1xqlzHLv/dLdfPIw2EOHM/kyCHdHKDVUaH1DFVBF0ZyrN57RFJvEoiw3RgfyDhzZK6hIMyNXDqGQ45hLVjOE= zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:02 localhost python3[26478]: ansible-ping Invoked with data=pong Jan 23 02:56:13 localhost sshd[26479]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:56:13 localhost systemd[1]: Created slice User Slice of UID 1002. Jan 23 02:56:13 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Jan 23 02:56:13 localhost systemd-logind[764]: New session 15 of user tripleo-admin. Jan 23 02:56:13 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Jan 23 02:56:13 localhost systemd[1]: Starting User Manager for UID 1002... Jan 23 02:56:13 localhost systemd[26483]: Queued start job for default target Main User Target. Jan 23 02:56:13 localhost systemd[26483]: Created slice User Application Slice. Jan 23 02:56:13 localhost systemd[26483]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 02:56:13 localhost systemd[26483]: Started Daily Cleanup of User's Temporary Directories. Jan 23 02:56:13 localhost systemd[26483]: Reached target Paths. Jan 23 02:56:13 localhost systemd[26483]: Reached target Timers. Jan 23 02:56:13 localhost systemd[26483]: Starting D-Bus User Message Bus Socket... Jan 23 02:56:13 localhost systemd[26483]: Starting Create User's Volatile Files and Directories... Jan 23 02:56:13 localhost systemd[26483]: Finished Create User's Volatile Files and Directories. Jan 23 02:56:13 localhost systemd[26483]: Listening on D-Bus User Message Bus Socket. Jan 23 02:56:13 localhost systemd[26483]: Reached target Sockets. Jan 23 02:56:13 localhost systemd[26483]: Reached target Basic System. Jan 23 02:56:13 localhost systemd[26483]: Reached target Main User Target. Jan 23 02:56:13 localhost systemd[26483]: Startup finished in 109ms. Jan 23 02:56:13 localhost systemd[1]: Started User Manager for UID 1002. Jan 23 02:56:13 localhost systemd[1]: Started Session 15 of User tripleo-admin. Jan 23 02:56:14 localhost python3[26544]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Jan 23 02:56:18 localhost python3[26564]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Jan 23 02:56:19 localhost python3[26580]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Jan 23 02:56:20 localhost python3[26628]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.af611d6gtmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:20 localhost python3[26658]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.af611d6gtmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:21 localhost python3[26674]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.af611d6gtmphosts insertbefore=BOF block=172.17.0.106 np0005593104.ooo.test np0005593104#012172.18.0.106 np0005593104.storage.ooo.test np0005593104.storage#012172.17.0.106 np0005593104.internalapi.ooo.test np0005593104.internalapi#012172.19.0.106 np0005593104.tenant.ooo.test np0005593104.tenant#012192.168.122.106 np0005593104.ctlplane.ooo.test np0005593104.ctlplane#012172.17.0.107 np0005593105.ooo.test np0005593105#012172.18.0.107 np0005593105.storage.ooo.test np0005593105.storage#012172.17.0.107 np0005593105.internalapi.ooo.test np0005593105.internalapi#012172.19.0.107 np0005593105.tenant.ooo.test np0005593105.tenant#012192.168.122.107 np0005593105.ctlplane.ooo.test np0005593105.ctlplane#012172.17.0.108 np0005593106.ooo.test np0005593106#012172.18.0.108 np0005593106.storage.ooo.test np0005593106.storage#012172.17.0.108 np0005593106.internalapi.ooo.test np0005593106.internalapi#012172.19.0.108 np0005593106.tenant.ooo.test np0005593106.tenant#012192.168.122.108 np0005593106.ctlplane.ooo.test np0005593106.ctlplane#012172.17.0.103 np0005593101.ooo.test np0005593101#012172.18.0.103 np0005593101.storage.ooo.test np0005593101.storage#012172.20.0.103 np0005593101.storagemgmt.ooo.test np0005593101.storagemgmt#012172.17.0.103 np0005593101.internalapi.ooo.test np0005593101.internalapi#012172.19.0.103 np0005593101.tenant.ooo.test np0005593101.tenant#012172.21.0.103 np0005593101.external.ooo.test np0005593101.external#012192.168.122.103 np0005593101.ctlplane.ooo.test np0005593101.ctlplane#012172.17.0.104 np0005593102.ooo.test np0005593102#012172.18.0.104 np0005593102.storage.ooo.test np0005593102.storage#012172.20.0.104 np0005593102.storagemgmt.ooo.test np0005593102.storagemgmt#012172.17.0.104 np0005593102.internalapi.ooo.test np0005593102.internalapi#012172.19.0.104 np0005593102.tenant.ooo.test np0005593102.tenant#012172.21.0.104 np0005593102.external.ooo.test np0005593102.external#012192.168.122.104 np0005593102.ctlplane.ooo.test np0005593102.ctlplane#012172.17.0.105 np0005593103.ooo.test np0005593103#012172.18.0.105 np0005593103.storage.ooo.test np0005593103.storage#012172.20.0.105 np0005593103.storagemgmt.ooo.test np0005593103.storagemgmt#012172.17.0.105 np0005593103.internalapi.ooo.test np0005593103.internalapi#012172.19.0.105 np0005593103.tenant.ooo.test np0005593103.tenant#012172.21.0.105 np0005593103.external.ooo.test np0005593103.external#012192.168.122.105 np0005593103.ctlplane.ooo.test np0005593103.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.238 overcloud.storage.ooo.test#012172.20.0.139 overcloud.storagemgmt.ooo.test#012172.17.0.233 overcloud.internalapi.ooo.test#012172.21.0.174 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:22 localhost python3[26690]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.af611d6gtmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:56:22 localhost python3[26707]: ansible-file Invoked with path=/tmp/ansible.af611d6gtmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:23 localhost python3[26723]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:56:24 localhost python3[26740]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:56:28 localhost python3[26759]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:56:29 localhost python3[26776]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:56:44 localhost systemd[1]: Reloading. Jan 23 02:56:44 localhost systemd-sysv-generator[26978]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:56:44 localhost systemd-rc-local-generator[26974]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:56:44 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:56:44 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Jan 23 02:56:52 localhost systemd[1]: Reloading. Jan 23 02:56:52 localhost systemd-rc-local-generator[27038]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:56:52 localhost systemd-sysv-generator[27043]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:56:52 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:56:52 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Jan 23 02:56:53 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Jan 23 02:56:53 localhost systemd[1]: Reloading. Jan 23 02:56:53 localhost systemd-rc-local-generator[27078]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:56:53 localhost systemd-sysv-generator[27082]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:56:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:56:53 localhost systemd[1]: Listening on LVM2 poll daemon socket. Jan 23 02:57:42 localhost kernel: SELinux: Converting 2713 SID table entries... Jan 23 02:57:42 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:57:42 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:57:42 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:57:42 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=7 res=1 Jan 23 02:57:42 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:57:42 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:57:42 localhost systemd[1]: Reloading. Jan 23 02:57:42 localhost systemd-sysv-generator[27870]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:57:42 localhost systemd-rc-local-generator[27865]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:57:42 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:57:42 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:57:42 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:57:43 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:57:43 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:57:43 localhost systemd[1]: run-r2ad90977704b4f9f8b2a5776d0a0465a.service: Deactivated successfully. Jan 23 02:57:43 localhost systemd[1]: run-r665e3bceefe64bbe99a1a38acffab625.service: Deactivated successfully. Jan 23 02:57:47 localhost python3[28745]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:49 localhost python3[28884]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 02:57:49 localhost systemd[1]: Reloading. Jan 23 02:57:49 localhost systemd-rc-local-generator[28912]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:57:49 localhost systemd-sysv-generator[28916]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:57:49 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:57:49 localhost python3[28938]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:50 localhost python3[28954]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:51 localhost python3[28971]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Jan 23 02:57:51 localhost python3[28989]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:52 localhost python3[29007]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:52 localhost python3[29025]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 02:57:52 localhost systemd[1]: Reloading Network Manager... Jan 23 02:57:52 localhost NetworkManager[5968]: [1769155072.5870] audit: op="reload" arg="0" pid=29028 uid=0 result="success" Jan 23 02:57:52 localhost NetworkManager[5968]: [1769155072.5882] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Jan 23 02:57:52 localhost NetworkManager[5968]: [1769155072.5882] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Jan 23 02:57:52 localhost systemd[1]: Reloaded Network Manager. Jan 23 02:57:53 localhost python3[29044]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:53 localhost python3[29061]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:57:54 localhost python3[29079]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:57:54 localhost python3[29095]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:55 localhost python3[29111]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Jan 23 02:57:55 localhost python3[29127]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:57:56 localhost python3[29143]: ansible-blockinfile Invoked with path=/tmp/ansible.rxmvkh7j block=[192.168.122.106]*,[np0005593104.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005593104.internalapi.ooo.test]*,[172.18.0.106]*,[np0005593104.storage.ooo.test]*,[172.19.0.106]*,[np0005593104.tenant.ooo.test]*,[np0005593104.ooo.test]*,[np0005593104]* ssh-rsa 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#012[192.168.122.107]*,[np0005593105.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005593105.internalapi.ooo.test]*,[172.18.0.107]*,[np0005593105.storage.ooo.test]*,[172.19.0.107]*,[np0005593105.tenant.ooo.test]*,[np0005593105.ooo.test]*,[np0005593105]* ssh-rsa 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#012[192.168.122.108]*,[np0005593106.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005593106.internalapi.ooo.test]*,[172.18.0.108]*,[np0005593106.storage.ooo.test]*,[172.19.0.108]*,[np0005593106.tenant.ooo.test]*,[np0005593106.ooo.test]*,[np0005593106]* ssh-rsa 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#012[192.168.122.103]*,[np0005593101.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005593101.external.ooo.test]*,[172.17.0.103]*,[np0005593101.internalapi.ooo.test]*,[172.18.0.103]*,[np0005593101.storage.ooo.test]*,[172.20.0.103]*,[np0005593101.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005593101.tenant.ooo.test]*,[np0005593101.ooo.test]*,[np0005593101]* ssh-rsa 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#012[192.168.122.104]*,[np0005593102.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005593102.external.ooo.test]*,[172.17.0.104]*,[np0005593102.internalapi.ooo.test]*,[172.18.0.104]*,[np0005593102.storage.ooo.test]*,[172.20.0.104]*,[np0005593102.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005593102.tenant.ooo.test]*,[np0005593102.ooo.test]*,[np0005593102]* ssh-rsa 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#012[192.168.122.105]*,[np0005593103.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005593103.external.ooo.test]*,[172.17.0.105]*,[np0005593103.internalapi.ooo.test]*,[172.18.0.105]*,[np0005593103.storage.ooo.test]*,[172.20.0.105]*,[np0005593103.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005593103.tenant.ooo.test]*,[np0005593103.ooo.test]*,[np0005593103]* ssh-rsa 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#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:56 localhost python3[29159]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.rxmvkh7j' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:57 localhost python3[29177]: ansible-file Invoked with path=/tmp/ansible.rxmvkh7j state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:58 localhost python3[29193]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Jan 23 02:57:58 localhost python3[29209]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:58 localhost python3[29227]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:59 localhost python3[29246]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Jan 23 02:58:02 localhost python3[29383]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:02 localhost python3[29400]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:58:05 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Jan 23 02:58:06 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Jan 23 02:58:06 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:58:06 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:58:06 localhost systemd[1]: Reloading. Jan 23 02:58:06 localhost systemd-sysv-generator[29476]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:58:06 localhost systemd-rc-local-generator[29469]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:58:06 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:58:06 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:58:06 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Jan 23 02:58:06 localhost systemd[1]: tuned.service: Deactivated successfully. Jan 23 02:58:06 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Jan 23 02:58:06 localhost systemd[1]: tuned.service: Consumed 1.834s CPU time. Jan 23 02:58:06 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Jan 23 02:58:06 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:58:06 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:58:06 localhost systemd[1]: run-r3569eb5c9c61471fa36a3f9f9c6a2c87.service: Deactivated successfully. Jan 23 02:58:08 localhost systemd[1]: Started Dynamic System Tuning Daemon. Jan 23 02:58:08 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:58:08 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:58:08 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:58:08 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:58:08 localhost systemd[1]: run-r1bd7ed81d3524dd3bf455b1ad77a6705.service: Deactivated successfully. Jan 23 02:58:09 localhost python3[29844]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 02:58:09 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Jan 23 02:58:09 localhost systemd[1]: tuned.service: Deactivated successfully. Jan 23 02:58:09 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Jan 23 02:58:09 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Jan 23 02:58:10 localhost systemd[1]: Started Dynamic System Tuning Daemon. Jan 23 02:58:11 localhost python3[30039]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:12 localhost python3[30056]: ansible-slurp Invoked with src=/etc/tuned/active_profile Jan 23 02:58:12 localhost python3[30072]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:58:13 localhost python3[30088]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:14 localhost python3[30108]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:15 localhost python3[30125]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:58:18 localhost python3[30141]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:22 localhost python3[30157]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:22 localhost python3[30205]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:23 localhost python3[30250]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155102.6357212-86941-83039074941965/source _original_basename=tmpwc47gt5a follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:23 localhost python3[30280]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:24 localhost python3[30328]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:24 localhost python3[30371]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155104.213864-87135-200913100775216/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=4c6f6f1e157c95c018a9a3fc557f58bca6ba52ee backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:25 localhost python3[30433]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:25 localhost python3[30476]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155105.1944857-87299-69652994393724/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=47e9dc10400b5a5894a9784d46950858e4030f13 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:26 localhost python3[30538]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:26 localhost python3[30581]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155106.1319392-87299-11870188141720/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=86b198682757f39396e7e285c6c5807167ea1f96 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:27 localhost python3[30643]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:28 localhost python3[30686]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155107.1752532-87299-76277143427968/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=67dce5a9d3e5afcc493ab8a2bfd1b7dcebd64331 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:28 localhost python3[30748]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:29 localhost python3[30791]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155108.353426-87299-268596645858211/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:29 localhost python3[30853]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:30 localhost python3[30896]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155109.304546-87299-57207477279695/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=7d7c89d906e4c2ec2b818268df1051d389b17dc2 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:30 localhost python3[30958]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:31 localhost python3[31001]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155110.3103268-87299-4055669968682/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:31 localhost python3[31063]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:32 localhost python3[31106]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155111.273917-87299-267944683988822/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=bc03d746e245e4d09238f3af0e483f473d83fd3a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:32 localhost python3[31168]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:33 localhost python3[31211]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155112.2394648-87299-109727254438772/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:33 localhost python3[31273]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:33 localhost python3[31316]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155113.1986074-87299-236058929276002/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:34 localhost python3[31378]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:34 localhost python3[31421]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155114.1432252-87299-18517413453041/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=a7b84a054aee3e7f789b21d949952d3cac995b0d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:35 localhost python3[31451]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:58:36 localhost python3[31499]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:36 localhost python3[31542]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155116.0189283-88837-493171775950/source _original_basename=tmp1nams241 follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:41 localhost python3[31572]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Jan 23 02:58:41 localhost python3[31633]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:46 localhost python3[31650]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:51 localhost python3[31667]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:51 localhost python3[31690]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:56 localhost python3[31707]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:56 localhost python3[31730]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:01 localhost python3[31747]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:05 localhost python3[31764]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:06 localhost python3[31787]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:10 localhost python3[31804]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:12 localhost systemd[26483]: Starting Mark boot as successful... Jan 23 02:59:12 localhost systemd[26483]: Finished Mark boot as successful. Jan 23 02:59:15 localhost python3[31822]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:15 localhost python3[31845]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:20 localhost python3[31862]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:24 localhost python3[31879]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:25 localhost python3[31902]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:29 localhost python3[31919]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:34 localhost python3[31936]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:34 localhost python3[31959]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:38 localhost python3[31976]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:44 localhost python3[31993]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:44 localhost python3[32041]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:45 localhost python3[32059]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmppj37rs_x recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:45 localhost python3[32089]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:46 localhost python3[32137]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:46 localhost python3[32155]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:47 localhost python3[32217]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:47 localhost python3[32235]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:48 localhost python3[32297]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:48 localhost python3[32315]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:49 localhost python3[32377]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:49 localhost python3[32395]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:49 localhost python3[32457]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:50 localhost python3[32475]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:50 localhost python3[32537]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:50 localhost python3[32555]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:51 localhost python3[32617]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:51 localhost python3[32635]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:52 localhost python3[32697]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:53 localhost python3[32715]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:53 localhost python3[32777]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:54 localhost python3[32795]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:54 localhost python3[32857]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:54 localhost python3[32875]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:55 localhost python3[32937]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:55 localhost python3[32955]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:56 localhost python3[32985]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:59:56 localhost python3[33033]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:57 localhost python3[33051]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmpzfk0tmzz recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:59 localhost python3[33081]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:00:05 localhost python3[33098]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:00:06 localhost python3[33116]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:00:06 localhost python3[33134]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:00:06 localhost systemd[1]: Reloading. Jan 23 03:00:06 localhost systemd-rc-local-generator[33159]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:00:06 localhost systemd-sysv-generator[33166]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:00:06 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:00:06 localhost systemd[1]: Starting Netfilter Tables... Jan 23 03:00:07 localhost systemd[1]: Finished Netfilter Tables. Jan 23 03:00:07 localhost python3[33224]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:08 localhost python3[33267]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155207.332874-92953-156725308334124/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:08 localhost python3[33297]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:09 localhost python3[33315]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:09 localhost python3[33364]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:10 localhost python3[33407]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155209.3242176-93170-113685971734034/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:10 localhost python3[33469]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:11 localhost python3[33512]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155210.4063847-93309-144759202335404/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:11 localhost python3[33574]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:12 localhost python3[33617]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155211.4743056-93457-234489932757411/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:12 localhost python3[33679]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:13 localhost python3[33722]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155212.5014858-93604-56311781696281/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:14 localhost python3[33784]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:15 localhost python3[33828]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155213.4888294-93733-279719268869653/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:15 localhost python3[33858]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:16 localhost python3[33923]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:16 localhost python3[33940]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:17 localhost python3[33957]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:17 localhost python3[33976]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:18 localhost python3[33992]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Jan 23 03:00:18 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=8 res=1 Jan 23 03:00:19 localhost python3[34013]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:19 localhost python3[34029]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:19 localhost python3[34045]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:20 localhost kernel: SELinux: Converting 2717 SID table entries... Jan 23 03:00:20 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:20 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:20 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:20 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:20 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:20 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:20 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:21 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=9 res=1 Jan 23 03:00:21 localhost python3[34066]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:21 localhost python3[34082]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:21 localhost python3[34098]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:22 localhost python3[34114]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:22 localhost python3[34130]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:00:25 localhost python3[34147]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 23 03:00:26 localhost python3[34164]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 23 03:00:26 localhost kernel: loop: module loaded Jan 23 03:00:26 localhost kernel: loop0: detected capacity change from 0 to 41943040 Jan 23 03:00:26 localhost python3[34189]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Jan 23 03:00:26 localhost lvm[34193]: PV /dev/loop0 not used. Jan 23 03:00:26 localhost lvm[34195]: PV /dev/loop0 online, VG cinder-volumes is complete. Jan 23 03:00:27 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Jan 23 03:00:27 localhost lvm[34197]: 0 logical volume(s) in volume group "cinder-volumes" now active Jan 23 03:00:27 localhost systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Jan 23 03:00:27 localhost python3[34245]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:27 localhost python3[34288]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155227.1440237-94718-176408469174432/source _original_basename=tmptfmj5lxa follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:28 localhost python3[34318]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Jan 23 03:00:28 localhost systemd[1]: Reloading. Jan 23 03:00:28 localhost systemd-rc-local-generator[34339]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:00:28 localhost systemd-sysv-generator[34343]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:00:28 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:00:28 localhost systemd[1]: Reloading. Jan 23 03:00:28 localhost systemd-rc-local-generator[34384]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:00:28 localhost systemd-sysv-generator[34387]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:00:28 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:00:29 localhost python3[34407]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:29 localhost python3[34423]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:30 localhost python3[34439]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:30 localhost python3[34455]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:30 localhost python3[34471]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:31 localhost python3[34487]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:31 localhost python3[34503]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:37 localhost python3[34649]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:37 localhost python3[34665]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:37 localhost python3[34681]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:38 localhost python3[34697]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:38 localhost python3[34713]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34729]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34745]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34761]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34777]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:40 localhost python3[34825]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:40 localhost python3[34868]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155240.1049817-95618-207362714862792/source _original_basename=tmpqfa29vgd follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:41 localhost python3[34898]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:42 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:00:42 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:42 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:42 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=10 res=1 Jan 23 03:00:42 localhost python3[34921]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:43 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:00:43 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:43 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:43 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=11 res=1 Jan 23 03:00:44 localhost python3[34942]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:44 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:00:44 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:44 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:44 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:45 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=12 res=1 Jan 23 03:00:45 localhost python3[34968]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:45 localhost python3[34984]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:46 localhost python3[35000]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:46 localhost python3[35016]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:00:46 localhost python3[35032]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:47 localhost python3[35049]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:00:51 localhost python3[35066]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:51 localhost python3[35114]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:52 localhost python3[35157]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155251.3642526-96509-121632361588530/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:53 localhost python3[35187]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:00:54 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Jan 23 03:00:54 localhost systemd[1]: Stopped Load Kernel Modules. Jan 23 03:00:54 localhost systemd[1]: Stopping Load Kernel Modules... Jan 23 03:00:54 localhost systemd[1]: Starting Load Kernel Modules... Jan 23 03:00:54 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jan 23 03:00:54 localhost kernel: Bridge firewalling registered Jan 23 03:00:54 localhost systemd-modules-load[35190]: Inserted module 'br_netfilter' Jan 23 03:00:54 localhost systemd-modules-load[35190]: Module 'msr' is built in Jan 23 03:00:54 localhost systemd[1]: Finished Load Kernel Modules. Jan 23 03:00:54 localhost python3[35241]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:55 localhost python3[35284]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155254.325802-96863-245425554049383/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:55 localhost python3[35314]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:55 localhost python3[35332]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:56 localhost python3[35350]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:56 localhost python3[35367]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:56 localhost python3[35384]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:58 localhost python3[35401]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:58 localhost python3[35419]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:58 localhost python3[35437]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:59 localhost python3[35455]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:59 localhost python3[35473]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:59 localhost python3[35491]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:01 localhost python3[35509]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:01 localhost python3[35527]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:01 localhost python3[35544]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:01 localhost python3[35572]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:02 localhost python3[35589]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:02 localhost python3[35606]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:03 localhost python3[35624]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:01:03 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 23 03:01:03 localhost systemd[1]: Stopped Apply Kernel Variables. Jan 23 03:01:03 localhost systemd[1]: Stopping Apply Kernel Variables... Jan 23 03:01:03 localhost systemd[1]: Starting Apply Kernel Variables... Jan 23 03:01:03 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jan 23 03:01:03 localhost systemd[1]: Finished Apply Kernel Variables. Jan 23 03:01:03 localhost python3[35644]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:04 localhost python3[35660]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:04 localhost python3[35676]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:01:04 localhost python3[35692]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:01:05 localhost python3[35708]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:01:05 localhost python3[35724]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:05 localhost python3[35740]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:06 localhost python3[35756]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:06 localhost python3[35772]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:06 localhost python3[35788]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:07 localhost python3[35804]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:07 localhost python3[35820]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:07 localhost python3[35836]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:08 localhost python3[35852]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:08 localhost python3[35868]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:08 localhost python3[35884]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:09 localhost python3[35900]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:09 localhost python3[35916]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:10 localhost python3[35932]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:10 localhost python3[35948]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:10 localhost python3[35964]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:11 localhost python3[35980]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:11 localhost python3[35996]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:11 localhost python3[36012]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Jan 23 03:01:12 localhost python3[36034]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005593103.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Jan 23 03:01:12 localhost python3[36058]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Jan 23 03:01:13 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=13 res=1 Jan 23 03:01:13 localhost python3[36079]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:13 localhost python3[36095]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:14 localhost python3[36111]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:14 localhost python3[36127]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:15 localhost python3[36175]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:15 localhost python3[36218]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155274.837124-98479-132632625428484/source _original_basename=tmpxz73v9r0 follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:16 localhost python3[36280]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:16 localhost python3[36323]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155275.8509889-98563-234301069464414/source _original_basename=tmpnp_3rzyp follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:17 localhost python3[36353]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Jan 23 03:01:17 localhost systemd[1]: Reloading. Jan 23 03:01:17 localhost systemd-rc-local-generator[36376]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:01:17 localhost systemd-sysv-generator[36383]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:01:17 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:01:17 localhost python3[36406]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:18 localhost python3[36422]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:18 localhost python3[36438]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:01:18 localhost systemd[1]: Stopping User Login Management... Jan 23 03:01:18 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Jan 23 03:01:18 localhost systemd[1]: Stopped User Login Management. Jan 23 03:01:18 localhost systemd[1]: Starting Load Kernel Module drm... Jan 23 03:01:18 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 23 03:01:18 localhost systemd[1]: Finished Load Kernel Module drm. Jan 23 03:01:18 localhost systemd[1]: Starting User Login Management... Jan 23 03:01:18 localhost systemd-logind[36446]: New seat seat0. Jan 23 03:01:18 localhost systemd-logind[36446]: Watching system buttons on /dev/input/event0 (Power Button) Jan 23 03:01:18 localhost systemd-logind[36446]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 23 03:01:18 localhost systemd[1]: Started User Login Management. Jan 23 03:01:18 localhost systemd-logind[36446]: New session 15 of user tripleo-admin. Jan 23 03:01:18 localhost systemd-logind[36446]: New session 14 of user zuul. Jan 23 03:01:19 localhost python3[36463]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:19 localhost python3[36479]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:20 localhost python3[36495]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:01:20 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:01:20 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:01:20 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:01:20 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:01:20 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:01:20 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:01:20 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:01:20 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:01:21 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=14 res=1 Jan 23 03:01:21 localhost python3[36516]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:21 localhost python3[36532]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:22 localhost python3[36548]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:23 localhost python3[36566]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:01:26 localhost python3[36583]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Jan 23 03:01:26 localhost python3[36644]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:27 localhost python3[36660]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:27 localhost systemd[26483]: Created slice User Background Tasks Slice. Jan 23 03:01:27 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:01:27 localhost systemd[26483]: Starting Cleanup of User's Temporary Files and Directories... Jan 23 03:01:27 localhost systemd[26483]: Finished Cleanup of User's Temporary Files and Directories. Jan 23 03:01:27 localhost python3[36723]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:28 localhost python3[36766]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155287.3497152-99350-215319121095224/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=970f7a3ad67ffa2712959f470bea37b0a4ba58f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:28 localhost python3[36828]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:29 localhost python3[36873]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155288.420685-99411-207173712842876/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:29 localhost python3[36903]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:30 localhost python3[36919]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:30 localhost python3[36935]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:30 localhost python3[36951]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:31 localhost python3[36999]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:31 localhost python3[37042]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155291.134655-99661-153772856792805/source _original_basename=tmp5nj46m8z follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:32 localhost python3[37072]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:32 localhost python3[37088]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:32 localhost python3[37104]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:33 localhost python3[37152]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:33 localhost python3[37195]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155293.1133428-99851-88915663423671/source _original_basename=tmpdeibsypk follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:34 localhost python3[37225]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:34 localhost python3[37241]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:35 localhost python3[37257]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:01:38 localhost python3[37306]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:39 localhost python3[37351]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155298.5754585-100353-10386367095166/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:39 localhost python3[37382]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:01:40 localhost systemd[1]: Stopping OpenSSH server daemon... Jan 23 03:01:40 localhost systemd[1]: sshd.service: Deactivated successfully. Jan 23 03:01:40 localhost systemd[1]: Stopped OpenSSH server daemon. Jan 23 03:01:40 localhost systemd[1]: Stopped target sshd-keygen.target. Jan 23 03:01:40 localhost systemd[1]: Stopping sshd-keygen.target... Jan 23 03:01:40 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:01:40 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:01:40 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:01:40 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 03:01:40 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 03:01:40 localhost sshd[37386]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:01:40 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 03:01:40 localhost python3[37402]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:40 localhost python3[37418]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:41 localhost python3[37434]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:41 localhost python3[37450]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:41 localhost python3[37466]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:42 localhost python3[37482]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:42 localhost python3[37498]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:43 localhost python3[37514]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:43 localhost python3[37532]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:44 localhost python3[37550]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:01:47 localhost python3[37599]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:48 localhost python3[37644]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155307.3863237-100806-256640496548240/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:49 localhost python3[37674]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:01:49 localhost python3[37692]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:01:49 localhost chronyd[766]: chronyd exiting Jan 23 03:01:49 localhost systemd[1]: Stopping NTP client/server... Jan 23 03:01:49 localhost systemd[1]: chronyd.service: Deactivated successfully. Jan 23 03:01:49 localhost systemd[1]: Stopped NTP client/server. Jan 23 03:01:49 localhost systemd[1]: chronyd.service: Consumed 118ms CPU time, read 1.9M from disk, written 4.0K to disk. Jan 23 03:01:49 localhost systemd[1]: Starting NTP client/server... Jan 23 03:01:49 localhost chronyd[37699]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Jan 23 03:01:49 localhost chronyd[37699]: Frequency -26.125 +/- 0.159 ppm read from /var/lib/chrony/drift Jan 23 03:01:49 localhost chronyd[37699]: Loaded seccomp filter (level 2) Jan 23 03:01:49 localhost systemd[1]: Started NTP client/server. Jan 23 03:01:50 localhost python3[37748]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:50 localhost python3[37791]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155309.9199545-100934-34892844286940/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:51 localhost python3[37821]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:01:51 localhost systemd[1]: Reloading. Jan 23 03:01:51 localhost systemd-sysv-generator[37848]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:01:51 localhost systemd-rc-local-generator[37843]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:01:51 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:01:51 localhost systemd[1]: Reloading. Jan 23 03:01:51 localhost systemd-rc-local-generator[37881]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:01:51 localhost systemd-sysv-generator[37887]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:01:51 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:01:51 localhost systemd[1]: Starting chronyd online sources service... Jan 23 03:01:51 localhost chronyc[37897]: 200 OK Jan 23 03:01:51 localhost systemd[1]: chrony-online.service: Deactivated successfully. Jan 23 03:01:51 localhost systemd[1]: Finished chronyd online sources service. Jan 23 03:01:52 localhost python3[37913]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:52 localhost chronyd[37699]: System clock was stepped by 0.000000 seconds Jan 23 03:01:52 localhost python3[37930]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:53 localhost chronyd[37699]: Selected source 216.128.178.20 (pool.ntp.org) Jan 23 03:02:03 localhost python3[37947]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:03 localhost chronyd[37699]: System clock was stepped by -0.000006 seconds Jan 23 03:02:03 localhost python3[37964]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:04 localhost python3[37981]: ansible-timezone Invoked with name=UTC hwclock=None Jan 23 03:02:04 localhost systemd[1]: Starting Time & Date Service... Jan 23 03:02:04 localhost systemd[1]: Started Time & Date Service. Jan 23 03:02:05 localhost python3[38001]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:05 localhost python3[38018]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:06 localhost python3[38035]: ansible-slurp Invoked with src=/etc/tuned/active_profile Jan 23 03:02:06 localhost python3[38051]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:02:07 localhost python3[38067]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:07 localhost python3[38083]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Jan 23 03:02:08 localhost python3[38099]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:08 localhost python3[38115]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:09 localhost python3[38131]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:09 localhost python3[38147]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:02:10 localhost kernel: SELinux: Converting 2723 SID table entries... Jan 23 03:02:10 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:02:10 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:02:10 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=15 res=1 Jan 23 03:02:10 localhost python3[38170]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:02:12 localhost python3[38307]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Jan 23 03:02:12 localhost rsyslogd[759]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Jan 23 03:02:13 localhost python3[38323]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:13 localhost python3[38339]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:13 localhost python3[38355]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Jan 23 03:02:14 localhost rsyslogd[759]: message too long (37323) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Jan 23 03:02:23 localhost python3[38371]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:02:24 localhost python3[38387]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005593103.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Jan 23 03:02:25 localhost python3[38409]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:26 localhost python3[38425]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Jan 23 03:02:26 localhost systemd[1]: Reloading. Jan 23 03:02:26 localhost systemd-rc-local-generator[38460]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:26 localhost systemd-sysv-generator[38463]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:26 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:26 localhost systemd[1]: Stopping NTP client/server... Jan 23 03:02:26 localhost chronyd[37699]: chronyd exiting Jan 23 03:02:26 localhost systemd[1]: chronyd.service: Deactivated successfully. Jan 23 03:02:26 localhost systemd[1]: Stopped NTP client/server. Jan 23 03:02:26 localhost systemd[1]: Starting NTP client/server... Jan 23 03:02:26 localhost chronyd[38475]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Jan 23 03:02:26 localhost chronyd[38475]: Frequency -26.125 +/- 0.159 ppm read from /var/lib/chrony/drift Jan 23 03:02:26 localhost chronyd[38475]: Loaded seccomp filter (level 2) Jan 23 03:02:26 localhost systemd[1]: Started NTP client/server. Jan 23 03:02:31 localhost chronyd[38475]: Selected source 216.232.132.95 (pool.ntp.org) Jan 23 03:02:33 localhost python3[38494]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593103.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Jan 23 03:02:34 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Jan 23 03:02:35 localhost python3[38517]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:35 localhost python3[38534]: ansible-ipaclient_set_hostname Invoked with hostname=np0005593103.ooo.test Jan 23 03:02:35 localhost systemd[1]: Starting Hostname Service... Jan 23 03:02:35 localhost systemd[1]: Started Hostname Service. Jan 23 03:02:35 localhost systemd-hostnamed[38537]: Hostname set to (static) Jan 23 03:02:36 localhost python3[38553]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593103.ooo.test kdc=ipa.ooo.test on_master=False Jan 23 03:02:37 localhost python3[38574]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005593103.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmp3lj6ic9r principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Jan 23 03:02:37 localhost python3[38574]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Jan 23 03:02:38 localhost python3[38595]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593103.ooo.test basedn=dc=ooo,dc=test Jan 23 03:02:39 localhost python3[38612]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593103.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Jan 23 03:02:39 localhost systemd-journald[618]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Jan 23 03:02:39 localhost systemd-journald[618]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 03:02:39 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 03:02:39 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 03:02:40 localhost python3[38630]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005593103.ooo.test krb_name=/tmp/tmp3lj6ic9r debug=False Jan 23 03:02:42 localhost python3[38659]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005593103.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmp3lj6ic9r ip_addresses=None Jan 23 03:02:45 localhost systemd[1]: Starting System Security Services Daemon... Jan 23 03:02:45 localhost sssd[38694]: Starting up Jan 23 03:02:45 localhost sssd_be[38695]: Starting up Jan 23 03:02:45 localhost sssd_ssh[38698]: Starting up Jan 23 03:02:45 localhost sssd_nss[38696]: Starting up Jan 23 03:02:45 localhost sssd_pam[38697]: Starting up Jan 23 03:02:45 localhost sssd_sudo[38699]: Starting up Jan 23 03:02:45 localhost sssd_pac[38700]: Starting up Jan 23 03:02:46 localhost systemd[1]: Started System Security Services Daemon. Jan 23 03:02:46 localhost systemd[1]: Reloading. Jan 23 03:02:46 localhost systemd-rc-local-generator[38728]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:46 localhost systemd-sysv-generator[38731]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:47 localhost python3[38755]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Jan 23 03:02:47 localhost systemd[1]: Stopping OpenSSH server daemon... Jan 23 03:02:47 localhost systemd[1]: sshd.service: Deactivated successfully. Jan 23 03:02:47 localhost systemd[1]: Stopped OpenSSH server daemon. Jan 23 03:02:47 localhost systemd[1]: Stopped target sshd-keygen.target. Jan 23 03:02:47 localhost systemd[1]: Stopping sshd-keygen.target... Jan 23 03:02:47 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:02:47 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:02:47 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:02:47 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 03:02:47 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 03:02:47 localhost sshd[38760]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:02:47 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 03:02:48 localhost python3[38777]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Jan 23 03:02:48 localhost python3[38794]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Jan 23 03:02:48 localhost systemd[1]: Reloading. Jan 23 03:02:48 localhost systemd-rc-local-generator[38822]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:48 localhost systemd-sysv-generator[38825]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:48 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:49 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Jan 23 03:02:49 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Jan 23 03:02:49 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Jan 23 03:02:49 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Jan 23 03:02:49 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Jan 23 03:02:49 localhost python3[38853]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp3lj6ic9r state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:50 localhost python3[38869]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005593103.ooo.test sssd=True force=True Jan 23 03:02:50 localhost python3[38890]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005593103.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Jan 23 03:02:51 localhost python3[38909]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:51 localhost python3[38925]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp3lj6ic9r state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:52 localhost python3[38941]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp3lj6ic9r.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:53 localhost python3[38957]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:02:53 localhost systemd[1]: Reloading. Jan 23 03:02:53 localhost systemd-sysv-generator[38989]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:53 localhost systemd-rc-local-generator[38985]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:53 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Jan 23 03:02:53 localhost certmonger[38997]: 2026-01-23 08:02:53 [38997] Changing to root directory. Jan 23 03:02:53 localhost certmonger[38997]: 2026-01-23 08:02:53 [38997] Obtaining system lock. Jan 23 03:02:53 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Jan 23 03:02:53 localhost certmonger[38998]: 2026-01-23 08:02:53 [38998] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[38999]: 2026-01-23 08:02:53 [38999] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[39000]: 2026-01-23 08:02:53 [39000] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[39001]: 2026-01-23 08:02:53 [39001] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[39002]: 2026-01-23 08:02:53 [39002] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[39003]: 2026-01-23 08:02:53 [39003] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[39004]: 2026-01-23 08:02:53 [39004] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[39005]: 2026-01-23 08:02:53 [39005] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:53 localhost certmonger[39006]: 2026-01-23 08:02:53 [39006] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[39007]: 2026-01-23 08:02:53 [39007] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[39008]: 2026-01-23 08:02:53 [39008] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[39009]: 2026-01-23 08:02:53 [39009] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[39010]: 2026-01-23 08:02:53 [39010] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[39011]: 2026-01-23 08:02:53 [39011] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[39012]: 2026-01-23 08:02:53 [39012] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[39013]: 2026-01-23 08:02:53 [39013] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:53 localhost certmonger[39014]: 2026-01-23 08:02:53 [39014] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[39015]: 2026-01-23 08:02:53 [39015] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[39016]: 2026-01-23 08:02:53 [39016] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[39017]: 2026-01-23 08:02:53 [39017] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[39018]: 2026-01-23 08:02:53 [39018] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[39019]: 2026-01-23 08:02:53 [39019] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[39020]: 2026-01-23 08:02:53 [39020] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[39021]: 2026-01-23 08:02:53 [39021] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:53 localhost certmonger[38997]: 2026-01-23 08:02:53 [38997] No hooks set for ca-pre-save command. Jan 23 03:02:53 localhost certmonger[38997]: 2026-01-23 08:02:53 [38997] No hooks set for ca-post-save command. Jan 23 03:02:53 localhost certmonger[39024]: 2026-01-23 08:02:53 [39024] Certificate "OOO.TEST IPA CA" valid for 631151025s. Jan 23 03:02:53 localhost certmonger[38997]: 2026-01-23 08:02:53 [38997] No hooks set for ca-pre-save command. Jan 23 03:02:53 localhost certmonger[38997]: 2026-01-23 08:02:53 [38997] No hooks set for ca-post-save command. Jan 23 03:02:53 localhost certmonger[39027]: 2026-01-23 08:02:53 [39027] Certificate "Local Signing Authority" valid for 31535999s. Jan 23 03:03:02 localhost python3[39075]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:03:03 localhost python3[39118]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155382.611536-104320-73671192540704/source _original_basename=tmpw42idqx9 follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:03 localhost python3[39148]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:03:05 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 03:03:06 localhost python3[39271]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:03:07 localhost python3[39395]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Jan 23 03:03:09 localhost python3[39411]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 03:03:09 localhost python3[39427]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 03:03:10 localhost python3[39443]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 03:03:11 localhost python3[39463]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:03:14 localhost python3[39480]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:03:17 localhost python3[39497]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:18 localhost python3[39513]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:18 localhost python3[39529]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:03:18 localhost systemd[1]: Reloading. Jan 23 03:03:18 localhost systemd-sysv-generator[39561]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:03:18 localhost systemd-rc-local-generator[39558]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:03:18 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:03:19 localhost python3[39583]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005593103.ctlplane.ooo.test'] principal=['HTTP/np0005593103.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.ctlplane.ooo.test" for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.ctlplane.ooo.test Jan 23 03:03:19 localhost certmonger[39593]: " for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593103.ctlplane.ooo.test@OOO.TEST Jan 23 03:03:19 localhost certmonger[39593]: " for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:19 localhost certmonger[39593]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTkzMTAzLmN0bHBsYW5lLm9v Jan 23 03:03:19 localhost certmonger[39593]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmYEKgxDa/mMo Jan 23 03:03:19 localhost certmonger[39593]: d9D1jPtXcMOrI9v6b/vICOcqdU00QUZdveLfk7T7DNPk4uKfcN+5zm4muPoLlfZ9 Jan 23 03:03:19 localhost certmonger[39593]: g4rKJac8kmRQ70vwyofkgdfZgzOhDELsHPtpbPuYbyBp3IyN1ua4s4U88wLz8/Vx Jan 23 03:03:19 localhost certmonger[39593]: 69ePBZH0vdfTcMaotm8zH9niAYUg2wwufVGDK2z758NiFw743KJ3yvaUtoKFWFnq Jan 23 03:03:19 localhost certmonger[39593]: Gib2acuT0RbF+WnBq/pudajg6yR6sFGUhSB95pMEq0VyLfBS9UBe4kKT+2HApS/c Jan 23 03:03:19 localhost certmonger[39593]: 9Bek5z7QSvdmEsQ2Gi5ZK6/24VgdJNgapR1lqZwjBR1Mn0g9RvB7RkaGY/uYD15v Jan 23 03:03:19 localhost certmonger[39593]: q8nv2mbt7wIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIA Jan 23 03:03:19 localhost certmonger[39593]: MwAwADgAMAAzADEAOTCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Jan 23 03:03:19 localhost certmonger[39593]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDMuY3RscGxhbmUub29vLnRlc3Sg Jan 23 03:03:19 localhost certmonger[39593]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEwMy5jdGxwbGFuZS5vb28u Jan 23 03:03:19 localhost certmonger[39593]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Jan 23 03:03:19 localhost certmonger[39593]: oSgwJhsESFRUUBsebnAwMDA1NTkzMTAzLmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Jan 23 03:03:19 localhost certmonger[39593]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Jan 23 03:03:19 localhost certmonger[39593]: BBTUYZt2vo5WybegVHSo+0L+/IS0uzANBgkqhkiG9w0BAQsFAAOCAQEAC2qJ8Gw0 Jan 23 03:03:19 localhost certmonger[39593]: 71l2fUSa5FR4otbdhsWggpRda98Cvpy1Aovh7mOkDlgdl9ZxBncjuSv45DU0Lxyo Jan 23 03:03:19 localhost certmonger[39593]: 62wi+A+MuXT9PoWcL76VbH+jQTUX8xA24qS3rCJFdydIHR3+REHz9yaZBDdI4X1A Jan 23 03:03:19 localhost certmonger[39593]: ucYgc+YMMuwcf/APbBBnizeq7G+je9kwwCgVGhW3HoEYFiI3TPHJIjXyMVguTcI5 Jan 23 03:03:19 localhost certmonger[39593]: k+1fhs9h36xnSXAKrCh0mPaEX3wliLpdXpIdCHAaNaRC60NWZg5zYi2WolRzTWWY Jan 23 03:03:19 localhost certmonger[39593]: PmOIUb6KF4YOWofi5QoWpCvBpFCMc/o7ECOnJe56YSJFOCm9ERkbbIo7WBUyKh88 Jan 23 03:03:19 localhost certmonger[39593]: 4YlXdB8gZpVVig== Jan 23 03:03:19 localhost certmonger[39593]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:19 localhost certmonger[39593]: " for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmYEKgxDa/mMod9D1jPtXcMOrI9v6b/vICOcqdU00QUZdveLfk7T7DNPk4uKfcN+5zm4muPoLlfZ9g4rKJac8kmRQ70vwyofkgdfZgzOhDELsHPtpbPuYbyBp3IyN1ua4s4U88wLz8/Vx69ePBZH0vdfTcMaotm8zH9niAYUg2wwufVGDK2z758NiFw743KJ3yvaUtoKFWFnqGib2acuT0RbF+WnBq/pudajg6yR6sFGUhSB95pMEq0VyLfBS9UBe4kKT+2HApS/c9Bek5z7QSvdmEsQ2Gi5ZK6/24VgdJNgapR1lqZwjBR1Mn0g9RvB7RkaGY/uYD15vq8nv2mbt7wIDAQAB" for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:19 localhost certmonger[39593]: 2026-01-23 08:03:19 [39593] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:19 localhost certmonger[38997]: 2026-01-23 08:03:19 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[39593]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:20 localhost certmonger[39593]: Certificate: "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" Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Certificate submission still ongoing. Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Certificate submission attempt complete. Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Child status = 0. Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Child output: Jan 23 03:03:20 localhost certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38997]: MIIFWTCCA8GgAwIBAgIRAJgah4EHoNaneCBIt1xDUy8wDQYJKoZIhvcNAQELBQAw Jan 23 03:03:20 localhost certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:20 localhost certmonger[38997]: cml0eTAeFw0yNjAxMjMwODAzMjBaFw0yODAxMjQwODAzMjBaMDwxETAPBgNVBAoM Jan 23 03:03:20 localhost certmonger[38997]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDMuY3RscGxhbmUub29vLnRl Jan 23 03:03:20 localhost certmonger[38997]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCZgQqDENr+Yyh30PWM Jan 23 03:03:20 localhost certmonger[38997]: +1dww6sj2/pv+8gI5yp1TTRBRl294t+TtPsM0+Ti4p9w37nObia4+guV9n2Disol Jan 23 03:03:20 localhost certmonger[38997]: pzySZFDvS/DKh+SB19mDM6EMQuwc+2ls+5hvIGncjI3W5rizhTzzAvPz9XHr148F Jan 23 03:03:20 localhost certmonger[38997]: kfS919Nwxqi2bzMf2eIBhSDbDC59UYMrbPvnw2IXDvjconfK9pS2goVYWeoaJvZp Jan 23 03:03:20 localhost certmonger[38997]: y5PRFsX5acGr+m51qODrJHqwUZSFIH3mkwSrRXIt8FL1QF7iQpP7YcClL9z0F6Tn Jan 23 03:03:20 localhost certmonger[38997]: PtBK92YSxDYaLlkrr/bhWB0k2BqlHWWpnCMFHUyfSD1G8HtGRoZj+5gPXm+rye/a Jan 23 03:03:20 localhost certmonger[38997]: Zu3vAgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 03:03:20 localhost certmonger[38997]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:20 localhost certmonger[38997]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 03:03:20 localhost certmonger[38997]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:20 localhost certmonger[38997]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 03:03:20 localhost certmonger[38997]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRiC+rV Jan 23 03:03:20 localhost certmonger[38997]: 1EHM3Wzg8wng76h/Lz7G6TCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDMuY3Rs Jan 23 03:03:20 localhost certmonger[38997]: cGxhbmUub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw Jan 23 03:03:20 localhost certmonger[38997]: My5jdGxwbGFuZS5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P Jan 23 03:03:20 localhost certmonger[38997]: Ty5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAzLmN0bHBsYW5l Jan 23 03:03:20 localhost certmonger[38997]: Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQClbnQMztT7++qU2eSKUNkY/AGp Jan 23 03:03:20 localhost certmonger[38997]: Tdr3WLJEkuwxSxpUFZtuWuOVGxrPiKQUYgWOTaRvJ71cp9afBRvVieDrzk0oRx9x Jan 23 03:03:20 localhost certmonger[38997]: 6muyJDtA00UK3P3J7y7YSYXsjHsrL9qipYxyolNQvRw5pHngKU0cmW2aNYRiWBSx Jan 23 03:03:20 localhost certmonger[38997]: 0FRMyvHQHISOc3/P3BULAmgjEVKMgcfz3NQIaCec04XHqlo+kPkNAlkSluD1lImh Jan 23 03:03:20 localhost certmonger[38997]: aJ/kCDXitTURgSDafU516l1kF1JhR0+Tw35LHoSfP/1FzRPSwLNKTRu8PvoFqhq/ Jan 23 03:03:20 localhost certmonger[38997]: XpaF4yPqyYIN96wjQnwoAxkiWLDJfMZdiZjLLKcODNAKy0gKl2QGLjMY0c7ZAn5o Jan 23 03:03:20 localhost certmonger[38997]: optRN38OtjE0BjfpL04mviT+6i0ddmN9XGs/HWioJtXon5yYqKisExMfnm+fOHSU Jan 23 03:03:20 localhost certmonger[38997]: bf0nTLnN7DdfPDecfFlT8rO8bZCJ0jb9FpdWls7BCvlpKn3RLgCEBvDNOtmDM+Cf Jan 23 03:03:20 localhost certmonger[38997]: pVwbba3fIrQKtDbaAaceFbd1M3xZsqaCNq+fLeQ= Jan 23 03:03:20 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38997]: " Jan 23 03:03:20 localhost certmonger[39595]: 2026-01-23 08:03:20 [39595] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[39595]: MIIFWTCCA8GgAwIBAgIRAJgah4EHoNaneCBIt1xDUy8wDQYJKoZIhvcNAQELBQAw Jan 23 03:03:20 localhost certmonger[39595]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:20 localhost certmonger[39595]: cml0eTAeFw0yNjAxMjMwODAzMjBaFw0yODAxMjQwODAzMjBaMDwxETAPBgNVBAoM Jan 23 03:03:20 localhost certmonger[39595]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDMuY3RscGxhbmUub29vLnRl Jan 23 03:03:20 localhost certmonger[39595]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCZgQqDENr+Yyh30PWM Jan 23 03:03:20 localhost certmonger[39595]: +1dww6sj2/pv+8gI5yp1TTRBRl294t+TtPsM0+Ti4p9w37nObia4+guV9n2Disol Jan 23 03:03:20 localhost certmonger[39595]: pzySZFDvS/DKh+SB19mDM6EMQuwc+2ls+5hvIGncjI3W5rizhTzzAvPz9XHr148F Jan 23 03:03:20 localhost certmonger[39595]: kfS919Nwxqi2bzMf2eIBhSDbDC59UYMrbPvnw2IXDvjconfK9pS2goVYWeoaJvZp Jan 23 03:03:20 localhost certmonger[39595]: y5PRFsX5acGr+m51qODrJHqwUZSFIH3mkwSrRXIt8FL1QF7iQpP7YcClL9z0F6Tn Jan 23 03:03:20 localhost certmonger[39595]: PtBK92YSxDYaLlkrr/bhWB0k2BqlHWWpnCMFHUyfSD1G8HtGRoZj+5gPXm+rye/a Jan 23 03:03:20 localhost certmonger[39595]: Zu3vAgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 03:03:20 localhost certmonger[39595]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:20 localhost certmonger[39595]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 03:03:20 localhost certmonger[39595]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:20 localhost certmonger[39595]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 03:03:20 localhost certmonger[39595]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRiC+rV Jan 23 03:03:20 localhost certmonger[39595]: 1EHM3Wzg8wng76h/Lz7G6TCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDMuY3Rs Jan 23 03:03:20 localhost certmonger[39595]: cGxhbmUub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw Jan 23 03:03:20 localhost certmonger[39595]: My5jdGxwbGFuZS5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P Jan 23 03:03:20 localhost certmonger[39595]: Ty5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAzLmN0bHBsYW5l Jan 23 03:03:20 localhost certmonger[39595]: Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQClbnQMztT7++qU2eSKUNkY/AGp Jan 23 03:03:20 localhost certmonger[39595]: Tdr3WLJEkuwxSxpUFZtuWuOVGxrPiKQUYgWOTaRvJ71cp9afBRvVieDrzk0oRx9x Jan 23 03:03:20 localhost certmonger[39595]: 6muyJDtA00UK3P3J7y7YSYXsjHsrL9qipYxyolNQvRw5pHngKU0cmW2aNYRiWBSx Jan 23 03:03:20 localhost certmonger[39595]: 0FRMyvHQHISOc3/P3BULAmgjEVKMgcfz3NQIaCec04XHqlo+kPkNAlkSluD1lImh Jan 23 03:03:20 localhost certmonger[39595]: aJ/kCDXitTURgSDafU516l1kF1JhR0+Tw35LHoSfP/1FzRPSwLNKTRu8PvoFqhq/ Jan 23 03:03:20 localhost certmonger[39595]: XpaF4yPqyYIN96wjQnwoAxkiWLDJfMZdiZjLLKcODNAKy0gKl2QGLjMY0c7ZAn5o Jan 23 03:03:20 localhost certmonger[39595]: optRN38OtjE0BjfpL04mviT+6i0ddmN9XGs/HWioJtXon5yYqKisExMfnm+fOHSU Jan 23 03:03:20 localhost certmonger[39595]: bf0nTLnN7DdfPDecfFlT8rO8bZCJ0jb9FpdWls7BCvlpKn3RLgCEBvDNOtmDM+Cf Jan 23 03:03:20 localhost certmonger[39595]: pVwbba3fIrQKtDbaAaceFbd1M3xZsqaCNq+fLeQ= Jan 23 03:03:20 localhost certmonger[39595]: -----END CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[39595]: ". Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Certificate submission still ongoing. Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Certificate submission postprocessing complete. Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Child status = 0. Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Child output: Jan 23 03:03:20 localhost certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\npVwbba3fIrQKtDbaAaceFbd1M3xZsqaCNq+fLeQ=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:20 localhost certmonger[38997]: " Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38997]: MIIFWTCCA8GgAwIBAgIRAJgah4EHoNaneCBIt1xDUy8wDQYJKoZIhvcNAQELBQAw Jan 23 03:03:20 localhost certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:20 localhost certmonger[38997]: cml0eTAeFw0yNjAxMjMwODAzMjBaFw0yODAxMjQwODAzMjBaMDwxETAPBgNVBAoM Jan 23 03:03:20 localhost certmonger[38997]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDMuY3RscGxhbmUub29vLnRl Jan 23 03:03:20 localhost certmonger[38997]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCZgQqDENr+Yyh30PWM Jan 23 03:03:20 localhost certmonger[38997]: +1dww6sj2/pv+8gI5yp1TTRBRl294t+TtPsM0+Ti4p9w37nObia4+guV9n2Disol Jan 23 03:03:20 localhost certmonger[38997]: pzySZFDvS/DKh+SB19mDM6EMQuwc+2ls+5hvIGncjI3W5rizhTzzAvPz9XHr148F Jan 23 03:03:20 localhost certmonger[38997]: kfS919Nwxqi2bzMf2eIBhSDbDC59UYMrbPvnw2IXDvjconfK9pS2goVYWeoaJvZp Jan 23 03:03:20 localhost certmonger[38997]: y5PRFsX5acGr+m51qODrJHqwUZSFIH3mkwSrRXIt8FL1QF7iQpP7YcClL9z0F6Tn Jan 23 03:03:20 localhost certmonger[38997]: PtBK92YSxDYaLlkrr/bhWB0k2BqlHWWpnCMFHUyfSD1G8HtGRoZj+5gPXm+rye/a Jan 23 03:03:20 localhost certmonger[38997]: Zu3vAgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 03:03:20 localhost certmonger[38997]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:20 localhost certmonger[38997]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 03:03:20 localhost certmonger[38997]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:20 localhost certmonger[38997]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 03:03:20 localhost certmonger[38997]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBRiC+rV Jan 23 03:03:20 localhost certmonger[38997]: 1EHM3Wzg8wng76h/Lz7G6TCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDMuY3Rs Jan 23 03:03:20 localhost certmonger[38997]: cGxhbmUub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw Jan 23 03:03:20 localhost certmonger[38997]: My5jdGxwbGFuZS5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P Jan 23 03:03:20 localhost certmonger[38997]: Ty5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAzLmN0bHBsYW5l Jan 23 03:03:20 localhost certmonger[38997]: Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQClbnQMztT7++qU2eSKUNkY/AGp Jan 23 03:03:20 localhost certmonger[38997]: Tdr3WLJEkuwxSxpUFZtuWuOVGxrPiKQUYgWOTaRvJ71cp9afBRvVieDrzk0oRx9x Jan 23 03:03:20 localhost certmonger[38997]: 6muyJDtA00UK3P3J7y7YSYXsjHsrL9qipYxyolNQvRw5pHngKU0cmW2aNYRiWBSx Jan 23 03:03:20 localhost certmonger[38997]: 0FRMyvHQHISOc3/P3BULAmgjEVKMgcfz3NQIaCec04XHqlo+kPkNAlkSluD1lImh Jan 23 03:03:20 localhost certmonger[38997]: aJ/kCDXitTURgSDafU516l1kF1JhR0+Tw35LHoSfP/1FzRPSwLNKTRu8PvoFqhq/ Jan 23 03:03:20 localhost certmonger[38997]: XpaF4yPqyYIN96wjQnwoAxkiWLDJfMZdiZjLLKcODNAKy0gKl2QGLjMY0c7ZAn5o Jan 23 03:03:20 localhost certmonger[38997]: optRN38OtjE0BjfpL04mviT+6i0ddmN9XGs/HWioJtXon5yYqKisExMfnm+fOHSU Jan 23 03:03:20 localhost certmonger[38997]: bf0nTLnN7DdfPDecfFlT8rO8bZCJ0jb9FpdWls7BCvlpKn3RLgCEBvDNOtmDM+Cf Jan 23 03:03:20 localhost certmonger[38997]: pVwbba3fIrQKtDbaAaceFbd1M3xZsqaCNq+fLeQ= Jan 23 03:03:20 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38997]: ". Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] No hooks set for pre-save command. Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[39603]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Jan 23 03:03:20 localhost certmonger[38997]: 2026-01-23 08:03:20 [38997] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 23 03:03:20 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 23 03:03:20 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Jan 23 03:03:20 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Jan 23 03:03:20 localhost python3[39623]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005593103.storage.ooo.test'] principal=['HTTP/np0005593103.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.storage.ooo.test" for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.storage.ooo.test Jan 23 03:03:21 localhost certmonger[39640]: " for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593103.storage.ooo.test@OOO.TEST Jan 23 03:03:21 localhost certmonger[39640]: " for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:21 localhost certmonger[39640]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29v Jan 23 03:03:21 localhost certmonger[39640]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDVzuxNrZtPDOBC Jan 23 03:03:21 localhost certmonger[39640]: p25/IkyTv5+dA5RdjldJIN4elmiKo482pTwYR1znvXlnigAKJtVfs71dqXfSFqbx Jan 23 03:03:21 localhost certmonger[39640]: Gx4yCcU2LdQxbYSDRXu6Bvxu71VPFd1ALNcVGOSUmmtE+Y5I83wuMJGaP4DtxRO7 Jan 23 03:03:21 localhost certmonger[39640]: +mwH7kZvjgt2XhF9ARlEhVWHgIjjDRpC6J3BJdmAI5V+QCotGixdhIlbLmRiRF+q Jan 23 03:03:21 localhost certmonger[39640]: tNN8CBqIFhpF95NyedORf2QF8MAtBtM7zG6iYXN38Y88sIYn3eyOgsuHQec7/+Xm Jan 23 03:03:21 localhost certmonger[39640]: cdfCHxdtdDXXmP6jhg6hIZGoJFYsxeZ/TObxbA+oSIbeaGl312Qvv2OPhuP6S82D Jan 23 03:03:21 localhost certmonger[39640]: uZsuqj1HAgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANgAwADEAMgAz Jan 23 03:03:21 localhost certmonger[39640]: ADAAOAAwADMAMgAxMIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Jan 23 03:03:21 localhost certmonger[39640]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMy5zdG9yYWdlLm9vby50ZXN0oDsG Jan 23 03:03:21 localhost certmonger[39640]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDMuc3RvcmFnZS5vb28udGVz Jan 23 03:03:21 localhost certmonger[39640]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Jan 23 03:03:21 localhost certmonger[39640]: JRsESFRUUBsdbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Jan 23 03:03:21 localhost certmonger[39640]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFGCW Jan 23 03:03:21 localhost certmonger[39640]: HMU+iOtFlEBefau15Phu4JZ8MA0GCSqGSIb3DQEBCwUAA4IBAQA39QX27grIAC+S Jan 23 03:03:21 localhost certmonger[39640]: 0kwa4tY7VzR3Kb25cpL4fCMOgLOAr/iB8iP27VquE7p2af0HFDXwsAsqoWyzetPQ Jan 23 03:03:21 localhost certmonger[39640]: NbHM/ho7j4D+2iyijjSdJu8OuF3DOilBBI0swsLp6T2UW0KA5XTt+Z9siQYsxGFx Jan 23 03:03:21 localhost certmonger[39640]: mhRrENDqTnqw+JO8NB0PbJWZIrOuoO5uM+4vThP9eZ14alLhnX/DvRo+oXaMlTIW Jan 23 03:03:21 localhost certmonger[39640]: G7lA4XWQC2aoYljyq8QSf/gTK3PDhRwza/8WKuuptlzyJMdzOLdKchZL/xmAk0Z5 Jan 23 03:03:21 localhost certmonger[39640]: ov3RR4C4etFy44XRTjyxR34Bq/k7LYFhsRBNU0oErAo4OHbgwBS7Hh1t7PNRoVxq Jan 23 03:03:21 localhost certmonger[39640]: MA5yjo+S Jan 23 03:03:21 localhost certmonger[39640]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:21 localhost certmonger[39640]: " for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1c7sTa2bTwzgQqdufyJMk7+fnQOUXY5XSSDeHpZoiqOPNqU8GEdc5715Z4oACibVX7O9Xal30ham8RseMgnFNi3UMW2Eg0V7ugb8bu9VTxXdQCzXFRjklJprRPmOSPN8LjCRmj+A7cUTu/psB+5Gb44Ldl4RfQEZRIVVh4CI4w0aQuidwSXZgCOVfkAqLRosXYSJWy5kYkRfqrTTfAgaiBYaRfeTcnnTkX9kBfDALQbTO8xuomFzd/GPPLCGJ93sjoLLh0HnO//l5nHXwh8XbXQ115j+o4YOoSGRqCRWLMXmf0zm8WwPqEiG3mhpd9dkL79jj4bj+kvNg7mbLqo9RwIDAQAB" for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:21 localhost certmonger[39640]: 2026-01-23 08:03:21 [39640] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[39640]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:21 localhost certmonger[39640]: Certificate: "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" Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Certificate submission still ongoing. Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Certificate submission attempt complete. Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Child status = 0. Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Child output: Jan 23 03:03:21 localhost certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38997]: MIIFVTCCA72gAwIBAgIRAJnDlUao9W7vq8dOPWsQHb4wDQYJKoZIhvcNAQELBQAw Jan 23 03:03:21 localhost certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:21 localhost certmonger[38997]: cml0eTAeFw0yNjAxMjMwODAzMjFaFw0yODAxMjQwODAzMjFaMDsxETAPBgNVBAoM Jan 23 03:03:21 localhost certmonger[38997]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDMuc3RvcmFnZS5vb28udGVz Jan 23 03:03:21 localhost certmonger[38997]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANXO7E2tm08M4EKnbn8i Jan 23 03:03:21 localhost certmonger[38997]: TJO/n50DlF2OV0kg3h6WaIqjjzalPBhHXOe9eWeKAAom1V+zvV2pd9IWpvEbHjIJ Jan 23 03:03:21 localhost certmonger[38997]: xTYt1DFthINFe7oG/G7vVU8V3UAs1xUY5JSaa0T5jkjzfC4wkZo/gO3FE7v6bAfu Jan 23 03:03:21 localhost certmonger[38997]: Rm+OC3ZeEX0BGUSFVYeAiOMNGkLoncEl2YAjlX5AKi0aLF2EiVsuZGJEX6q003wI Jan 23 03:03:21 localhost certmonger[38997]: GogWGkX3k3J505F/ZAXwwC0G0zvMbqJhc3fxjzywhifd7I6Cy4dB5zv/5eZx18If Jan 23 03:03:21 localhost certmonger[38997]: F210NdeY/qOGDqEhkagkVizF5n9M5vFsD6hIht5oaXfXZC+/Y4+G4/pLzYO5my6q Jan 23 03:03:21 localhost certmonger[38997]: PUcCAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:21 localhost certmonger[38997]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38997]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:21 localhost certmonger[38997]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38997]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:21 localhost certmonger[38997]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNXsTTiA Jan 23 03:03:21 localhost certmonger[38997]: S9G5Lt7+mhBjWb3L1WrqMIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMy5zdG9y Jan 23 03:03:21 localhost certmonger[38997]: YWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDMu Jan 23 03:03:21 localhost certmonger[38997]: c3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U Jan 23 03:03:21 localhost certmonger[38997]: RVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29v Jan 23 03:03:21 localhost certmonger[38997]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHcyozUt/uttH/JB7Bm4x84UKyPgdVLd Jan 23 03:03:21 localhost certmonger[38997]: zJvoFuOzv0uF0kP+xO3l2Jv7JM8Cz9HXDlkhsdLnq9FQXlt8D0Xhe0LyPg7diK4a Jan 23 03:03:21 localhost certmonger[38997]: ytNkHIiMr5VnNqtyjQMqL+iuEzKIS4il4FMqoaW9yU2MJaAuoE7hRMvje9sKiEJJ Jan 23 03:03:21 localhost certmonger[38997]: rLpZMIhvfKoqZQ9TGAnfZjmqPeh86hOJv7xBvqPbln/I/Do/jDVpMn2ph/I9bR6k Jan 23 03:03:21 localhost certmonger[38997]: kkERdAjFgDiej3aE28CzAH6hFFa7mdtX8AAAoz1CjkBmPi7TwYM5M71NneWUdK4E Jan 23 03:03:21 localhost certmonger[38997]: amKUvzjLX/k7VQtdLKYgttYmO9IGMBfht6eS4l4A4fwFaTHoS4Iq62qFxwy0W2iG Jan 23 03:03:21 localhost certmonger[38997]: P69dyOhwbZLB8yTVKlM1Vj3nQ2lbNux653zMUuORAcl+wekCOVm3UOEoVMgJ53XS Jan 23 03:03:21 localhost certmonger[38997]: E1VAyoKHyqbj9H3IgLdJ17p4AKUueOPBJIXIVQH4NyqHVWwzuRW1swCYEP64Sbo5 Jan 23 03:03:21 localhost certmonger[38997]: zjOuP0NizpWhZOHmTjZLHspnlLRAF9HMFQ== Jan 23 03:03:21 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38997]: " Jan 23 03:03:21 localhost certmonger[39642]: 2026-01-23 08:03:21 [39642] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[39642]: MIIFVTCCA72gAwIBAgIRAJnDlUao9W7vq8dOPWsQHb4wDQYJKoZIhvcNAQELBQAw Jan 23 03:03:21 localhost certmonger[39642]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:21 localhost certmonger[39642]: cml0eTAeFw0yNjAxMjMwODAzMjFaFw0yODAxMjQwODAzMjFaMDsxETAPBgNVBAoM Jan 23 03:03:21 localhost certmonger[39642]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDMuc3RvcmFnZS5vb28udGVz Jan 23 03:03:21 localhost certmonger[39642]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANXO7E2tm08M4EKnbn8i Jan 23 03:03:21 localhost certmonger[39642]: TJO/n50DlF2OV0kg3h6WaIqjjzalPBhHXOe9eWeKAAom1V+zvV2pd9IWpvEbHjIJ Jan 23 03:03:21 localhost certmonger[39642]: xTYt1DFthINFe7oG/G7vVU8V3UAs1xUY5JSaa0T5jkjzfC4wkZo/gO3FE7v6bAfu Jan 23 03:03:21 localhost certmonger[39642]: Rm+OC3ZeEX0BGUSFVYeAiOMNGkLoncEl2YAjlX5AKi0aLF2EiVsuZGJEX6q003wI Jan 23 03:03:21 localhost certmonger[39642]: GogWGkX3k3J505F/ZAXwwC0G0zvMbqJhc3fxjzywhifd7I6Cy4dB5zv/5eZx18If Jan 23 03:03:21 localhost certmonger[39642]: F210NdeY/qOGDqEhkagkVizF5n9M5vFsD6hIht5oaXfXZC+/Y4+G4/pLzYO5my6q Jan 23 03:03:21 localhost certmonger[39642]: PUcCAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:21 localhost certmonger[39642]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[39642]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:21 localhost certmonger[39642]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[39642]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:21 localhost certmonger[39642]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNXsTTiA Jan 23 03:03:21 localhost certmonger[39642]: S9G5Lt7+mhBjWb3L1WrqMIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMy5zdG9y Jan 23 03:03:21 localhost certmonger[39642]: YWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDMu Jan 23 03:03:21 localhost certmonger[39642]: c3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U Jan 23 03:03:21 localhost certmonger[39642]: RVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29v Jan 23 03:03:21 localhost certmonger[39642]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHcyozUt/uttH/JB7Bm4x84UKyPgdVLd Jan 23 03:03:21 localhost certmonger[39642]: zJvoFuOzv0uF0kP+xO3l2Jv7JM8Cz9HXDlkhsdLnq9FQXlt8D0Xhe0LyPg7diK4a Jan 23 03:03:21 localhost certmonger[39642]: ytNkHIiMr5VnNqtyjQMqL+iuEzKIS4il4FMqoaW9yU2MJaAuoE7hRMvje9sKiEJJ Jan 23 03:03:21 localhost certmonger[39642]: rLpZMIhvfKoqZQ9TGAnfZjmqPeh86hOJv7xBvqPbln/I/Do/jDVpMn2ph/I9bR6k Jan 23 03:03:21 localhost certmonger[39642]: kkERdAjFgDiej3aE28CzAH6hFFa7mdtX8AAAoz1CjkBmPi7TwYM5M71NneWUdK4E Jan 23 03:03:21 localhost certmonger[39642]: amKUvzjLX/k7VQtdLKYgttYmO9IGMBfht6eS4l4A4fwFaTHoS4Iq62qFxwy0W2iG Jan 23 03:03:21 localhost certmonger[39642]: P69dyOhwbZLB8yTVKlM1Vj3nQ2lbNux653zMUuORAcl+wekCOVm3UOEoVMgJ53XS Jan 23 03:03:21 localhost certmonger[39642]: E1VAyoKHyqbj9H3IgLdJ17p4AKUueOPBJIXIVQH4NyqHVWwzuRW1swCYEP64Sbo5 Jan 23 03:03:21 localhost certmonger[39642]: zjOuP0NizpWhZOHmTjZLHspnlLRAF9HMFQ== Jan 23 03:03:21 localhost certmonger[39642]: -----END CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[39642]: ". Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Certificate submission still ongoing. Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Certificate submission postprocessing complete. Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Child status = 0. Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Child output: Jan 23 03:03:21 localhost certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nzjOuP0NizpWhZOHmTjZLHspnlLRAF9HMFQ==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:21 localhost certmonger[38997]: " Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38997]: MIIFVTCCA72gAwIBAgIRAJnDlUao9W7vq8dOPWsQHb4wDQYJKoZIhvcNAQELBQAw Jan 23 03:03:21 localhost certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:21 localhost certmonger[38997]: cml0eTAeFw0yNjAxMjMwODAzMjFaFw0yODAxMjQwODAzMjFaMDsxETAPBgNVBAoM Jan 23 03:03:21 localhost certmonger[38997]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDMuc3RvcmFnZS5vb28udGVz Jan 23 03:03:21 localhost certmonger[38997]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANXO7E2tm08M4EKnbn8i Jan 23 03:03:21 localhost certmonger[38997]: TJO/n50DlF2OV0kg3h6WaIqjjzalPBhHXOe9eWeKAAom1V+zvV2pd9IWpvEbHjIJ Jan 23 03:03:21 localhost certmonger[38997]: xTYt1DFthINFe7oG/G7vVU8V3UAs1xUY5JSaa0T5jkjzfC4wkZo/gO3FE7v6bAfu Jan 23 03:03:21 localhost certmonger[38997]: Rm+OC3ZeEX0BGUSFVYeAiOMNGkLoncEl2YAjlX5AKi0aLF2EiVsuZGJEX6q003wI Jan 23 03:03:21 localhost certmonger[38997]: GogWGkX3k3J505F/ZAXwwC0G0zvMbqJhc3fxjzywhifd7I6Cy4dB5zv/5eZx18If Jan 23 03:03:21 localhost certmonger[38997]: F210NdeY/qOGDqEhkagkVizF5n9M5vFsD6hIht5oaXfXZC+/Y4+G4/pLzYO5my6q Jan 23 03:03:21 localhost certmonger[38997]: PUcCAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:21 localhost certmonger[38997]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38997]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:21 localhost certmonger[38997]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38997]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:21 localhost certmonger[38997]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNXsTTiA Jan 23 03:03:21 localhost certmonger[38997]: S9G5Lt7+mhBjWb3L1WrqMIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMy5zdG9y Jan 23 03:03:21 localhost certmonger[38997]: YWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDMu Jan 23 03:03:21 localhost certmonger[38997]: c3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U Jan 23 03:03:21 localhost certmonger[38997]: RVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29v Jan 23 03:03:21 localhost certmonger[38997]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHcyozUt/uttH/JB7Bm4x84UKyPgdVLd Jan 23 03:03:21 localhost certmonger[38997]: zJvoFuOzv0uF0kP+xO3l2Jv7JM8Cz9HXDlkhsdLnq9FQXlt8D0Xhe0LyPg7diK4a Jan 23 03:03:21 localhost certmonger[38997]: ytNkHIiMr5VnNqtyjQMqL+iuEzKIS4il4FMqoaW9yU2MJaAuoE7hRMvje9sKiEJJ Jan 23 03:03:21 localhost certmonger[38997]: rLpZMIhvfKoqZQ9TGAnfZjmqPeh86hOJv7xBvqPbln/I/Do/jDVpMn2ph/I9bR6k Jan 23 03:03:21 localhost certmonger[38997]: kkERdAjFgDiej3aE28CzAH6hFFa7mdtX8AAAoz1CjkBmPi7TwYM5M71NneWUdK4E Jan 23 03:03:21 localhost certmonger[38997]: amKUvzjLX/k7VQtdLKYgttYmO9IGMBfht6eS4l4A4fwFaTHoS4Iq62qFxwy0W2iG Jan 23 03:03:21 localhost certmonger[38997]: P69dyOhwbZLB8yTVKlM1Vj3nQ2lbNux653zMUuORAcl+wekCOVm3UOEoVMgJ53XS Jan 23 03:03:21 localhost certmonger[38997]: E1VAyoKHyqbj9H3IgLdJ17p4AKUueOPBJIXIVQH4NyqHVWwzuRW1swCYEP64Sbo5 Jan 23 03:03:21 localhost certmonger[38997]: zjOuP0NizpWhZOHmTjZLHspnlLRAF9HMFQ== Jan 23 03:03:21 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38997]: ". Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] No hooks set for pre-save command. Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[39651]: Certificate in file "/etc/pki/tls/certs/httpd-storage.crt" issued by CA and saved. Jan 23 03:03:21 localhost certmonger[38997]: 2026-01-23 08:03:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:21 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:21 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:21 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:21 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:21 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:21 localhost auditd[726]: queue to plugins is full - dropping event Jan 23 03:03:21 localhost auditd[726]: auditd queue full reporting limit reached - ending dropped event notifications Jan 23 03:03:21 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:21 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost python3[39667]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005593103.storagemgmt.ooo.test'] principal=['HTTP/np0005593103.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38997]: 2026-01-23 08:03:22 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.storagemgmt.ooo.test" for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.storagemgmt.ooo.test Jan 23 03:03:23 localhost certmonger[39677]: " for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593103.storagemgmt.ooo.test@OOO.TEST Jan 23 03:03:23 localhost certmonger[39677]: " for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:23 localhost certmonger[39677]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLnN0b3JhZ2VtZ210 Jan 23 03:03:23 localhost certmonger[39677]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA33cC1gYJ Jan 23 03:03:23 localhost certmonger[39677]: SvTlk/GUuVMT9C6NrlYL5M8gDWW4kVHT4A/v0Aa89BY9tojOXy/NfWDtQwNFfMiM Jan 23 03:03:23 localhost certmonger[39677]: 3GDUFwpEB1rSKCmB9r0ScEf96egr26RH7+O2IRuCko5TfuMe9f/sO+rGv38wMV/z Jan 23 03:03:23 localhost certmonger[39677]: Jq395m45axlCArIfwqJUDweHw7aBz7sbSFGtKZYZcjw+GGFrjZIzeLybUegylKPI Jan 23 03:03:23 localhost certmonger[39677]: lQ+PJGRVrsRbO2J6zysHHd/rQ2KLec8C98eeQdsJp1wtwxFuwy9gSOuyGy93bg7j Jan 23 03:03:23 localhost certmonger[39677]: pIrQpiop7pKGFsiIpxA5L/hLsWudNTMPC/ZtK1W3w66Pk/tCfqUhaa/vMn9OY1zR Jan 23 03:03:23 localhost certmonger[39677]: EmDB3OkZ23j8wwIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 03:03:23 localhost certmonger[39677]: ADIAMwAwADgAMAAzADIAMjCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Jan 23 03:03:23 localhost certmonger[39677]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDMuc3RvcmFnZW1nbXQub29v Jan 23 03:03:23 localhost certmonger[39677]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU5MzEwMy5zdG9yYWdl Jan 23 03:03:23 localhost certmonger[39677]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Jan 23 03:03:23 localhost certmonger[39677]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAzLnN0b3JhZ2VtZ210Lm9v Jan 23 03:03:23 localhost certmonger[39677]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Jan 23 03:03:23 localhost certmonger[39677]: AjAAMB0GA1UdDgQWBBSwOgdgImZeK2guThmQoNABFfjH7DANBgkqhkiG9w0BAQsF Jan 23 03:03:23 localhost certmonger[39677]: AAOCAQEATmtQLkyysPtQZp3g/xJI94pl9rDvXNB9qK8oP4Xc9cbA6ndQ2LtgRKit Jan 23 03:03:23 localhost certmonger[39677]: lv9a7NtZoou6m8tt3WQeaugDUBWYdLezNekCbqWGkKNrfSFE1oD3ZrfQLHWaBYxh Jan 23 03:03:23 localhost certmonger[39677]: hlYb+2ZyKNyG3ZX7T2i7vhAKHvy8bEzd5cZ5EOO/ORq/OaFSuc5yrRW4DtcZehjJ Jan 23 03:03:23 localhost certmonger[39677]: QD1axsgJ34Uu8Pu+/cfghR/ue7r2ec9Ihjb7accCr0P9qRDRfRQmT0b1EweBaDTB Jan 23 03:03:23 localhost certmonger[39677]: iDBS+Ud5CSwoTMmfXI4YF9oRLrRvk7KLAcuuyH+M+uRjKdi6t7hG12CeCedQ0WEH Jan 23 03:03:23 localhost certmonger[39677]: sG+YWh85kqjiMxtdqS8QJIFRseucrg== Jan 23 03:03:23 localhost certmonger[39677]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:23 localhost certmonger[39677]: " for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA33cC1gYJSvTlk/GUuVMT9C6NrlYL5M8gDWW4kVHT4A/v0Aa89BY9tojOXy/NfWDtQwNFfMiM3GDUFwpEB1rSKCmB9r0ScEf96egr26RH7+O2IRuCko5TfuMe9f/sO+rGv38wMV/zJq395m45axlCArIfwqJUDweHw7aBz7sbSFGtKZYZcjw+GGFrjZIzeLybUegylKPIlQ+PJGRVrsRbO2J6zysHHd/rQ2KLec8C98eeQdsJp1wtwxFuwy9gSOuyGy93bg7jpIrQpiop7pKGFsiIpxA5L/hLsWudNTMPC/ZtK1W3w66Pk/tCfqUhaa/vMn9OY1zREmDB3OkZ23j8wwIDAQAB" for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:23 localhost certmonger[39677]: 2026-01-23 08:03:23 [39677] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost certmonger[39677]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost certmonger[39677]: Certificate: "MIIFZDCCA8ygAwIBAgIQBjrLSJL9FdtbkwvNYwWMBTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI2MDEyMzA4MDMyM1oXDTI4MDEyNDA4MDMyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAN93AtYGCUr05ZPxlLlTE/Quja5WC+TPIA1luJFR0+AP79AGvPQWPbaIzl8vzX1g7UMDRXzIjNxg1BcKRAda0igpgfa9EnBH/enoK9ukR+/jtiEbgpKOU37jHvX/7Dvqxr9/MDFf8yat/eZuOWsZQgKyH8KiVA8Hh8O2gc+7G0hRrSmWGXI8Phhha42SM3i8m1HoMpSjyJUPjyRkVa7EWzties8rBx3f60Nii3nPAvfHnkHbCadcLcMRbsMvYEjrshsvd24O46SK0KYqKe6ShhbIiKcQOS/4S7FrnTUzDwv2bStVt8Ouj5P7Qn6lIWmv7zJ/TmNc0RJgwdzpGdt4/MMCAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBHTYZK1TCedf8FPIrkqykoV+PMHMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdtdC5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTkzMTAzLnN0b3JhZ2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1OTMxMDMuc3RvcmFnZW1nbXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBALSm+R+a1VvlY5mhLtr27qNLLEh9fGx+oNTOGMHIJZg2XG5LeSQysObXEO8C9TzaA15Xv4OSR4SK8phuALI9/JfAnnHMDqgBfnaEjYyzmPvX1MA7BLmp4LeTe057HaMOtRxHrXWrdONWm/KsJ8Xn5j3rAFgZhfq4IKwDf4EQ0Cnj03WTllMag3FxDcAPWs6PNQ/oxZVnLQK9lRx0KXq25l8nZqFIBKCiH1L8dQn3rl4zLpnXvzurRNAJfztiKkCIBJaV3WuU+7cRuVlCbDGa8fsuaLslQL19hbLR2ezIH6cP/yF+6LiZKZxkC7B+QAZCwVty0BXs1rdIJ7VpespzrOhy14812GVJiE7xRjeMHej34WZpwGKwUqHtEptD3GA+M07z4VicV9wwWw8onMOzfurKBg6DTNgEJOgwym5J7+YZ4FQrDLd5l0FXIcSOzYGSadV1xUO4J6xRFxGYWm8sIi/+S60DCHpWKGkVNcf6XK6LgishwjBqZkU1nQ/Gc/fRcw==" Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Certificate submission still ongoing. Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Certificate submission attempt complete. Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Child status = 0. Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Child output: Jan 23 03:03:23 localhost certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38997]: MIIFZDCCA8ygAwIBAgIQBjrLSJL9FdtbkwvNYwWMBTANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:23 localhost certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:23 localhost certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDMyM1oXDTI4MDEyNDA4MDMyM1owPzERMA8GA1UECgwI Jan 23 03:03:23 localhost certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdtdC5vb28u Jan 23 03:03:23 localhost certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAN93AtYGCUr05ZPx Jan 23 03:03:23 localhost certmonger[38997]: lLlTE/Quja5WC+TPIA1luJFR0+AP79AGvPQWPbaIzl8vzX1g7UMDRXzIjNxg1BcK Jan 23 03:03:23 localhost certmonger[38997]: RAda0igpgfa9EnBH/enoK9ukR+/jtiEbgpKOU37jHvX/7Dvqxr9/MDFf8yat/eZu Jan 23 03:03:23 localhost certmonger[38997]: OWsZQgKyH8KiVA8Hh8O2gc+7G0hRrSmWGXI8Phhha42SM3i8m1HoMpSjyJUPjyRk Jan 23 03:03:23 localhost certmonger[38997]: Va7EWzties8rBx3f60Nii3nPAvfHnkHbCadcLcMRbsMvYEjrshsvd24O46SK0KYq Jan 23 03:03:23 localhost certmonger[38997]: Ke6ShhbIiKcQOS/4S7FrnTUzDwv2bStVt8Ouj5P7Qn6lIWmv7zJ/TmNc0RJgwdzp Jan 23 03:03:23 localhost certmonger[38997]: Gdt4/MMCAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 03:03:23 localhost certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 03:03:23 localhost certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 03:03:23 localhost certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 03:03:23 localhost certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 03:03:23 localhost certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBHT Jan 23 03:03:23 localhost certmonger[38997]: YZK1TCedf8FPIrkqykoV+PMHMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU5MzEwMy5z Jan 23 03:03:23 localhost certmonger[38997]: dG9yYWdlbWdtdC5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1 Jan 23 03:03:23 localhost certmonger[38997]: NTkzMTAzLnN0b3JhZ2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBE Jan 23 03:03:23 localhost certmonger[38997]: MEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1OTMxMDMu Jan 23 03:03:23 localhost certmonger[38997]: c3RvcmFnZW1nbXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBALSm+R+a1Vvl Jan 23 03:03:23 localhost certmonger[38997]: Y5mhLtr27qNLLEh9fGx+oNTOGMHIJZg2XG5LeSQysObXEO8C9TzaA15Xv4OSR4SK Jan 23 03:03:23 localhost certmonger[38997]: 8phuALI9/JfAnnHMDqgBfnaEjYyzmPvX1MA7BLmp4LeTe057HaMOtRxHrXWrdONW Jan 23 03:03:23 localhost certmonger[38997]: m/KsJ8Xn5j3rAFgZhfq4IKwDf4EQ0Cnj03WTllMag3FxDcAPWs6PNQ/oxZVnLQK9 Jan 23 03:03:23 localhost certmonger[38997]: lRx0KXq25l8nZqFIBKCiH1L8dQn3rl4zLpnXvzurRNAJfztiKkCIBJaV3WuU+7cR Jan 23 03:03:23 localhost certmonger[38997]: uVlCbDGa8fsuaLslQL19hbLR2ezIH6cP/yF+6LiZKZxkC7B+QAZCwVty0BXs1rdI Jan 23 03:03:23 localhost certmonger[38997]: J7VpespzrOhy14812GVJiE7xRjeMHej34WZpwGKwUqHtEptD3GA+M07z4VicV9ww Jan 23 03:03:23 localhost certmonger[38997]: Ww8onMOzfurKBg6DTNgEJOgwym5J7+YZ4FQrDLd5l0FXIcSOzYGSadV1xUO4J6xR Jan 23 03:03:23 localhost certmonger[38997]: FxGYWm8sIi/+S60DCHpWKGkVNcf6XK6LgishwjBqZkU1nQ/Gc/fRcw== Jan 23 03:03:23 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38997]: " Jan 23 03:03:23 localhost certmonger[39679]: 2026-01-23 08:03:23 [39679] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[39679]: MIIFZDCCA8ygAwIBAgIQBjrLSJL9FdtbkwvNYwWMBTANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:23 localhost certmonger[39679]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:23 localhost certmonger[39679]: aXR5MB4XDTI2MDEyMzA4MDMyM1oXDTI4MDEyNDA4MDMyM1owPzERMA8GA1UECgwI Jan 23 03:03:23 localhost certmonger[39679]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdtdC5vb28u Jan 23 03:03:23 localhost certmonger[39679]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAN93AtYGCUr05ZPx Jan 23 03:03:23 localhost certmonger[39679]: lLlTE/Quja5WC+TPIA1luJFR0+AP79AGvPQWPbaIzl8vzX1g7UMDRXzIjNxg1BcK Jan 23 03:03:23 localhost certmonger[39679]: RAda0igpgfa9EnBH/enoK9ukR+/jtiEbgpKOU37jHvX/7Dvqxr9/MDFf8yat/eZu Jan 23 03:03:23 localhost certmonger[39679]: OWsZQgKyH8KiVA8Hh8O2gc+7G0hRrSmWGXI8Phhha42SM3i8m1HoMpSjyJUPjyRk Jan 23 03:03:23 localhost certmonger[39679]: Va7EWzties8rBx3f60Nii3nPAvfHnkHbCadcLcMRbsMvYEjrshsvd24O46SK0KYq Jan 23 03:03:23 localhost certmonger[39679]: Ke6ShhbIiKcQOS/4S7FrnTUzDwv2bStVt8Ouj5P7Qn6lIWmv7zJ/TmNc0RJgwdzp Jan 23 03:03:23 localhost certmonger[39679]: Gdt4/MMCAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 03:03:23 localhost certmonger[39679]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 03:03:23 localhost certmonger[39679]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 03:03:23 localhost certmonger[39679]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 03:03:23 localhost certmonger[39679]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 03:03:23 localhost certmonger[39679]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBHT Jan 23 03:03:23 localhost certmonger[39679]: YZK1TCedf8FPIrkqykoV+PMHMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU5MzEwMy5z Jan 23 03:03:23 localhost certmonger[39679]: dG9yYWdlbWdtdC5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1 Jan 23 03:03:23 localhost certmonger[39679]: NTkzMTAzLnN0b3JhZ2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBE Jan 23 03:03:23 localhost certmonger[39679]: MEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1OTMxMDMu Jan 23 03:03:23 localhost certmonger[39679]: c3RvcmFnZW1nbXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBALSm+R+a1Vvl Jan 23 03:03:23 localhost certmonger[39679]: Y5mhLtr27qNLLEh9fGx+oNTOGMHIJZg2XG5LeSQysObXEO8C9TzaA15Xv4OSR4SK Jan 23 03:03:23 localhost certmonger[39679]: 8phuALI9/JfAnnHMDqgBfnaEjYyzmPvX1MA7BLmp4LeTe057HaMOtRxHrXWrdONW Jan 23 03:03:23 localhost certmonger[39679]: m/KsJ8Xn5j3rAFgZhfq4IKwDf4EQ0Cnj03WTllMag3FxDcAPWs6PNQ/oxZVnLQK9 Jan 23 03:03:23 localhost certmonger[39679]: lRx0KXq25l8nZqFIBKCiH1L8dQn3rl4zLpnXvzurRNAJfztiKkCIBJaV3WuU+7cR Jan 23 03:03:23 localhost certmonger[39679]: uVlCbDGa8fsuaLslQL19hbLR2ezIH6cP/yF+6LiZKZxkC7B+QAZCwVty0BXs1rdI Jan 23 03:03:23 localhost certmonger[39679]: J7VpespzrOhy14812GVJiE7xRjeMHej34WZpwGKwUqHtEptD3GA+M07z4VicV9ww Jan 23 03:03:23 localhost certmonger[39679]: Ww8onMOzfurKBg6DTNgEJOgwym5J7+YZ4FQrDLd5l0FXIcSOzYGSadV1xUO4J6xR Jan 23 03:03:23 localhost certmonger[39679]: FxGYWm8sIi/+S60DCHpWKGkVNcf6XK6LgishwjBqZkU1nQ/Gc/fRcw== Jan 23 03:03:23 localhost certmonger[39679]: -----END CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[39679]: ". Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Certificate submission still ongoing. Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Certificate submission postprocessing complete. Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Child status = 0. Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Child output: Jan 23 03:03:23 localhost certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nFxGYWm8sIi/+S60DCHpWKGkVNcf6XK6LgishwjBqZkU1nQ/Gc/fRcw==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:23 localhost certmonger[38997]: " Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38997]: MIIFZDCCA8ygAwIBAgIQBjrLSJL9FdtbkwvNYwWMBTANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:23 localhost certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:23 localhost certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDMyM1oXDTI4MDEyNDA4MDMyM1owPzERMA8GA1UECgwI Jan 23 03:03:23 localhost certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdtdC5vb28u Jan 23 03:03:23 localhost certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAN93AtYGCUr05ZPx Jan 23 03:03:23 localhost certmonger[38997]: lLlTE/Quja5WC+TPIA1luJFR0+AP79AGvPQWPbaIzl8vzX1g7UMDRXzIjNxg1BcK Jan 23 03:03:23 localhost certmonger[38997]: RAda0igpgfa9EnBH/enoK9ukR+/jtiEbgpKOU37jHvX/7Dvqxr9/MDFf8yat/eZu Jan 23 03:03:23 localhost certmonger[38997]: OWsZQgKyH8KiVA8Hh8O2gc+7G0hRrSmWGXI8Phhha42SM3i8m1HoMpSjyJUPjyRk Jan 23 03:03:23 localhost certmonger[38997]: Va7EWzties8rBx3f60Nii3nPAvfHnkHbCadcLcMRbsMvYEjrshsvd24O46SK0KYq Jan 23 03:03:23 localhost certmonger[38997]: Ke6ShhbIiKcQOS/4S7FrnTUzDwv2bStVt8Ouj5P7Qn6lIWmv7zJ/TmNc0RJgwdzp Jan 23 03:03:23 localhost certmonger[38997]: Gdt4/MMCAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 03:03:23 localhost certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 03:03:23 localhost certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 03:03:23 localhost certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 03:03:23 localhost certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 03:03:23 localhost certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBHT Jan 23 03:03:23 localhost certmonger[38997]: YZK1TCedf8FPIrkqykoV+PMHMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU5MzEwMy5z Jan 23 03:03:23 localhost certmonger[38997]: dG9yYWdlbWdtdC5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1 Jan 23 03:03:23 localhost certmonger[38997]: NTkzMTAzLnN0b3JhZ2VtZ210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBE Jan 23 03:03:23 localhost certmonger[38997]: MEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1OTMxMDMu Jan 23 03:03:23 localhost certmonger[38997]: c3RvcmFnZW1nbXQub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBALSm+R+a1Vvl Jan 23 03:03:23 localhost certmonger[38997]: Y5mhLtr27qNLLEh9fGx+oNTOGMHIJZg2XG5LeSQysObXEO8C9TzaA15Xv4OSR4SK Jan 23 03:03:23 localhost certmonger[38997]: 8phuALI9/JfAnnHMDqgBfnaEjYyzmPvX1MA7BLmp4LeTe057HaMOtRxHrXWrdONW Jan 23 03:03:23 localhost certmonger[38997]: m/KsJ8Xn5j3rAFgZhfq4IKwDf4EQ0Cnj03WTllMag3FxDcAPWs6PNQ/oxZVnLQK9 Jan 23 03:03:23 localhost certmonger[38997]: lRx0KXq25l8nZqFIBKCiH1L8dQn3rl4zLpnXvzurRNAJfztiKkCIBJaV3WuU+7cR Jan 23 03:03:23 localhost certmonger[38997]: uVlCbDGa8fsuaLslQL19hbLR2ezIH6cP/yF+6LiZKZxkC7B+QAZCwVty0BXs1rdI Jan 23 03:03:23 localhost certmonger[38997]: J7VpespzrOhy14812GVJiE7xRjeMHej34WZpwGKwUqHtEptD3GA+M07z4VicV9ww Jan 23 03:03:23 localhost certmonger[38997]: Ww8onMOzfurKBg6DTNgEJOgwym5J7+YZ4FQrDLd5l0FXIcSOzYGSadV1xUO4J6xR Jan 23 03:03:23 localhost certmonger[38997]: FxGYWm8sIi/+S60DCHpWKGkVNcf6XK6LgishwjBqZkU1nQ/Gc/fRcw== Jan 23 03:03:23 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38997]: ". Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] No hooks set for pre-save command. Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[39687]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Jan 23 03:03:23 localhost certmonger[38997]: 2026-01-23 08:03:23 [38997] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:23 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost python3[39703]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005593103.internalapi.ooo.test'] principal=['HTTP/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 03:03:24 localhost certmonger[39713]: " for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 03:03:24 localhost certmonger[39713]: " for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:24 localhost certmonger[39713]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 03:03:24 localhost certmonger[39713]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwm9HZOK8 Jan 23 03:03:24 localhost certmonger[39713]: r8XNwQYoej+Ds4cpunPYr1C594SoIO/2mORm5wH7UdIjEQnrKl5yZ7gcbSYc3caa Jan 23 03:03:24 localhost certmonger[39713]: Z9sOxe2a8J0L1oDGjaJMLLVHp3AxTholE6Wh0SqIahJW40g51Ox0zYOApq0zTXAb Jan 23 03:03:24 localhost certmonger[39713]: Gw4xT+bLcu9KE5cweNLZD5EDRmnkw6sDkOSCBRQUW9dQmz8pHFhiIqDBX1RfSxWk Jan 23 03:03:24 localhost certmonger[39713]: IwKG67dUL5j+7GTz69qYt2ZcWzdF9Jvu8B7egvUECLaH9fULn7pSRFZdcXkEmWkZ Jan 23 03:03:24 localhost certmonger[39713]: kwDkg4YU8NQZ97hwVQz7kx6KXP84seI4oyae92vPsJfeVCjt7stnrZANC/OVzjRE Jan 23 03:03:24 localhost certmonger[39713]: r64xVUaG4sP/EQIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 03:03:24 localhost certmonger[39713]: ADIAMwAwADgAMAAzADIANDCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Jan 23 03:03:24 localhost certmonger[39713]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 03:03:24 localhost certmonger[39713]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU5MzEwMy5pbnRlcm5h Jan 23 03:03:24 localhost certmonger[39713]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Jan 23 03:03:24 localhost certmonger[39713]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9v Jan 23 03:03:24 localhost certmonger[39713]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Jan 23 03:03:24 localhost certmonger[39713]: AjAAMB0GA1UdDgQWBBRHnOE/6NPgrD3owCiHfMexz61yFzANBgkqhkiG9w0BAQsF Jan 23 03:03:24 localhost certmonger[39713]: AAOCAQEAp0cjmmxd0qYRdY23p1PDogAcikDjSDvjjDZmHF6PQ7UEo4P1KaMWV1/l Jan 23 03:03:24 localhost certmonger[39713]: 2eia1osGiWaOzsnGCHnuDKhKfN9ydwIg/CmGZ83jmpor0+LCqpuAUB+zLKl2PfiU Jan 23 03:03:24 localhost certmonger[39713]: dalvENcaOrHlknVd5bKN4XWF782zs9YUbMWJ17YmFIdkG9WdnF4L9ZUwY0salLXP Jan 23 03:03:24 localhost certmonger[39713]: 3pkY3YFhratQ1pwNMTVtXsjMdmdLxS+JD+tur938akkucU05c1WX06QqkQxH7Wwi Jan 23 03:03:24 localhost certmonger[39713]: 499gq3QMDP3xrUWw74IheiAvI5iNwf/4KxnG9NY4Uol+wEia73MdlOnZDDeVLtX6 Jan 23 03:03:24 localhost certmonger[39713]: ycp14Fd30bRAOTzVIAhWQiPnNvsiRQ== Jan 23 03:03:24 localhost certmonger[39713]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:24 localhost certmonger[39713]: " for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDCb0dk4ryvxc3BBih6P4Ozhym6c9ivULn3hKgg7/aY5GbnAftR0iMRCesqXnJnuBxtJhzdxppn2w7F7ZrwnQvWgMaNokwstUencDFOGiUTpaHRKohqElbjSDnU7HTNg4CmrTNNcBsbDjFP5sty70oTlzB40tkPkQNGaeTDqwOQ5IIFFBRb11CbPykcWGIioMFfVF9LFaQjAobrt1QvmP7sZPPr2pi3ZlxbN0X0m+7wHt6C9QQItof19QufulJEVl1xeQSZaRmTAOSDhhTw1Bn3uHBVDPuTHopc/zix4jijJp73a8+wl95UKO3uy2etkA0L85XONESvrjFVRobiw/8RAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAiVVdZ9qaBHJ3bLvT3G6RIJU4H6T44lRen+ZQoHGshKm2sWBWbexiteqKo98ATgVIUb5140Ksf+1Lip4eT8DpKiiODvtmIlp/7ceHA6UGNE2gRhsTASJNNwj/ItvEwIoLDuDLZqSbvzd0dk88S/lnY3PRifwtQjxVwGwApG2dOBdpScnn1U+BxsOI49wMw9qoL4IyiG8pD/OXlm5QHJG/nUZnNb0YqGTo7byByBZb3iGgS4CIgkyvOk4QcbJvXG12l3K/G6N02prV7uxZsL8Xtw83prVlMYCdibXeHp3IC0eEZ/Ccl2Zz1AYaZoJyFvhtDFjYq2kUvGadLWdtIiOq1Q==" for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwm9HZOK8r8XNwQYoej+Ds4cpunPYr1C594SoIO/2mORm5wH7UdIjEQnrKl5yZ7gcbSYc3caaZ9sOxe2a8J0L1oDGjaJMLLVHp3AxTholE6Wh0SqIahJW40g51Ox0zYOApq0zTXAbGw4xT+bLcu9KE5cweNLZD5EDRmnkw6sDkOSCBRQUW9dQmz8pHFhiIqDBX1RfSxWkIwKG67dUL5j+7GTz69qYt2ZcWzdF9Jvu8B7egvUECLaH9fULn7pSRFZdcXkEmWkZkwDkg4YU8NQZ97hwVQz7kx6KXP84seI4oyae92vPsJfeVCjt7stnrZANC/OVzjREr64xVUaG4sP/EQIDAQAB" for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:24 localhost certmonger[39713]: 2026-01-23 08:03:24 [39713] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost certmonger[38997]: 2026-01-23 08:03:24 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[39713]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:24 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost certmonger[39713]: Certificate: "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" Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Certificate submission still ongoing. Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Certificate submission attempt complete. Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Child status = 0. Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Child output: Jan 23 03:03:25 localhost certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:25 localhost certmonger[38997]: MIIFZDCCA8ygAwIBAgIQfm1lPOoSKtPDQDWmP7GcQDANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:25 localhost certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:25 localhost certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDMyNFoXDTI4MDEyNDA4MDMyNFowPzERMA8GA1UECgwI Jan 23 03:03:25 localhost certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 03:03:25 localhost certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMJvR2TivK/FzcEG Jan 23 03:03:25 localhost certmonger[38997]: KHo/g7OHKbpz2K9QufeEqCDv9pjkZucB+1HSIxEJ6ypecme4HG0mHN3GmmfbDsXt Jan 23 03:03:25 localhost certmonger[38997]: mvCdC9aAxo2iTCy1R6dwMU4aJROlodEqiGoSVuNIOdTsdM2DgKatM01wGxsOMU/m Jan 23 03:03:25 localhost certmonger[38997]: y3LvShOXMHjS2Q+RA0Zp5MOrA5DkggUUFFvXUJs/KRxYYiKgwV9UX0sVpCMChuu3 Jan 23 03:03:25 localhost certmonger[38997]: VC+Y/uxk8+vamLdmXFs3RfSb7vAe3oL1BAi2h/X1C5+6UkRWXXF5BJlpGZMA5IOG Jan 23 03:03:25 localhost certmonger[38997]: FPDUGfe4cFUM+5Meilz/OLHiOKMmnvdrz7CX3lQo7e7LZ62QDQvzlc40RK+uMVVG Jan 23 03:03:25 localhost certmonger[38997]: huLD/xECAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 03:03:25 localhost certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 03:03:25 localhost certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 03:03:25 localhost certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 03:03:25 localhost certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 03:03:25 localhost certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMy5 Jan 23 03:03:25 localhost certmonger[38997]: ip10VgjporvqA8mz7IfIlr1yMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU5MzEwMy5p Jan 23 03:03:25 localhost certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1 Jan 23 03:03:25 localhost certmonger[38997]: NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBE Jan 23 03:03:25 localhost certmonger[38997]: MEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1OTMxMDMu Jan 23 03:03:25 localhost certmonger[38997]: aW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGlqBJqbQosx Jan 23 03:03:25 localhost certmonger[38997]: A1GbPFjSBma2pBYOuVUgN2s6MA6TxX4ZQsB5VImI8D6wDBcLVqrm+E2Ir7ddKwCE Jan 23 03:03:25 localhost certmonger[38997]: PrCygBACRc86g4P9CHbngnxuIUTlxtj6hud7T9uVVfzS7XqaQ9DFRtRVOBk2YMbt Jan 23 03:03:25 localhost certmonger[38997]: uXL4QxXiFU/0T11fV1BFruOWS0K4qfks/2glhUz+uSoBdl9h4YJj9oY3CQTIXPZ5 Jan 23 03:03:25 localhost certmonger[38997]: QkDQAwSch0ePEH0slmvQ8UTFs22mOuhkOqXigWE8i0cAkbCraxTj3yGK7LMjhL9X Jan 23 03:03:25 localhost certmonger[38997]: 3xtWG5ptvzMoIQLVJxLYOD32tWYTu07Vae99L0DB6E3dwTni4pqJveIBmXQR627l Jan 23 03:03:25 localhost certmonger[38997]: Rser141dKZPD+2SDU9d/Nvab2RquewEt+dQipZdEdHF6SzL+RmL9GrK2nuwgDqpJ Jan 23 03:03:25 localhost certmonger[38997]: qCTScpN5KFF/o4gGBDOdKRokVQqlytw6mxYXovsT6Ks4+nxcfyvBxHf9UlQAs5jX Jan 23 03:03:25 localhost certmonger[38997]: zfVj/YRqJNo4Kylg0H0TE7N3YUpgGD+MpP7EHMGlsaR/LwBZklH4Dw== Jan 23 03:03:25 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:25 localhost certmonger[38997]: " Jan 23 03:03:25 localhost certmonger[39715]: 2026-01-23 08:03:25 [39715] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:25 localhost certmonger[39715]: MIIFZDCCA8ygAwIBAgIQfm1lPOoSKtPDQDWmP7GcQDANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:25 localhost certmonger[39715]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:25 localhost certmonger[39715]: aXR5MB4XDTI2MDEyMzA4MDMyNFoXDTI4MDEyNDA4MDMyNFowPzERMA8GA1UECgwI Jan 23 03:03:25 localhost certmonger[39715]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 03:03:25 localhost certmonger[39715]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMJvR2TivK/FzcEG Jan 23 03:03:25 localhost certmonger[39715]: KHo/g7OHKbpz2K9QufeEqCDv9pjkZucB+1HSIxEJ6ypecme4HG0mHN3GmmfbDsXt Jan 23 03:03:25 localhost certmonger[39715]: mvCdC9aAxo2iTCy1R6dwMU4aJROlodEqiGoSVuNIOdTsdM2DgKatM01wGxsOMU/m Jan 23 03:03:25 localhost certmonger[39715]: y3LvShOXMHjS2Q+RA0Zp5MOrA5DkggUUFFvXUJs/KRxYYiKgwV9UX0sVpCMChuu3 Jan 23 03:03:25 localhost certmonger[39715]: VC+Y/uxk8+vamLdmXFs3RfSb7vAe3oL1BAi2h/X1C5+6UkRWXXF5BJlpGZMA5IOG Jan 23 03:03:25 localhost certmonger[39715]: FPDUGfe4cFUM+5Meilz/OLHiOKMmnvdrz7CX3lQo7e7LZ62QDQvzlc40RK+uMVVG Jan 23 03:03:25 localhost certmonger[39715]: huLD/xECAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 03:03:25 localhost certmonger[39715]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 03:03:25 localhost certmonger[39715]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 03:03:25 localhost certmonger[39715]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 03:03:25 localhost certmonger[39715]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 03:03:25 localhost certmonger[39715]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMy5 Jan 23 03:03:25 localhost certmonger[39715]: ip10VgjporvqA8mz7IfIlr1yMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU5MzEwMy5p Jan 23 03:03:25 localhost certmonger[39715]: bnRlcm5hbGFwaS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1 Jan 23 03:03:25 localhost certmonger[39715]: NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBE Jan 23 03:03:25 localhost certmonger[39715]: MEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1OTMxMDMu Jan 23 03:03:25 localhost certmonger[39715]: aW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGlqBJqbQosx Jan 23 03:03:25 localhost certmonger[39715]: A1GbPFjSBma2pBYOuVUgN2s6MA6TxX4ZQsB5VImI8D6wDBcLVqrm+E2Ir7ddKwCE Jan 23 03:03:25 localhost certmonger[39715]: PrCygBACRc86g4P9CHbngnxuIUTlxtj6hud7T9uVVfzS7XqaQ9DFRtRVOBk2YMbt Jan 23 03:03:25 localhost certmonger[39715]: uXL4QxXiFU/0T11fV1BFruOWS0K4qfks/2glhUz+uSoBdl9h4YJj9oY3CQTIXPZ5 Jan 23 03:03:25 localhost certmonger[39715]: QkDQAwSch0ePEH0slmvQ8UTFs22mOuhkOqXigWE8i0cAkbCraxTj3yGK7LMjhL9X Jan 23 03:03:25 localhost certmonger[39715]: 3xtWG5ptvzMoIQLVJxLYOD32tWYTu07Vae99L0DB6E3dwTni4pqJveIBmXQR627l Jan 23 03:03:25 localhost certmonger[39715]: Rser141dKZPD+2SDU9d/Nvab2RquewEt+dQipZdEdHF6SzL+RmL9GrK2nuwgDqpJ Jan 23 03:03:25 localhost certmonger[39715]: qCTScpN5KFF/o4gGBDOdKRokVQqlytw6mxYXovsT6Ks4+nxcfyvBxHf9UlQAs5jX Jan 23 03:03:25 localhost certmonger[39715]: zfVj/YRqJNo4Kylg0H0TE7N3YUpgGD+MpP7EHMGlsaR/LwBZklH4Dw== Jan 23 03:03:25 localhost certmonger[39715]: -----END CERTIFICATE----- Jan 23 03:03:25 localhost certmonger[39715]: ". Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Certificate submission still ongoing. Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Certificate submission postprocessing complete. Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Child status = 0. Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Child output: Jan 23 03:03:25 localhost certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nzfVj/YRqJNo4Kylg0H0TE7N3YUpgGD+MpP7EHMGlsaR/LwBZklH4Dw==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:25 localhost certmonger[38997]: " Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:25 localhost certmonger[38997]: MIIFZDCCA8ygAwIBAgIQfm1lPOoSKtPDQDWmP7GcQDANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:25 localhost certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:25 localhost certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDMyNFoXDTI4MDEyNDA4MDMyNFowPzERMA8GA1UECgwI Jan 23 03:03:25 localhost certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 03:03:25 localhost certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMJvR2TivK/FzcEG Jan 23 03:03:25 localhost certmonger[38997]: KHo/g7OHKbpz2K9QufeEqCDv9pjkZucB+1HSIxEJ6ypecme4HG0mHN3GmmfbDsXt Jan 23 03:03:25 localhost certmonger[38997]: mvCdC9aAxo2iTCy1R6dwMU4aJROlodEqiGoSVuNIOdTsdM2DgKatM01wGxsOMU/m Jan 23 03:03:25 localhost certmonger[38997]: y3LvShOXMHjS2Q+RA0Zp5MOrA5DkggUUFFvXUJs/KRxYYiKgwV9UX0sVpCMChuu3 Jan 23 03:03:25 localhost certmonger[38997]: VC+Y/uxk8+vamLdmXFs3RfSb7vAe3oL1BAi2h/X1C5+6UkRWXXF5BJlpGZMA5IOG Jan 23 03:03:25 localhost certmonger[38997]: FPDUGfe4cFUM+5Meilz/OLHiOKMmnvdrz7CX3lQo7e7LZ62QDQvzlc40RK+uMVVG Jan 23 03:03:25 localhost certmonger[38997]: huLD/xECAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 03:03:25 localhost certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 03:03:25 localhost certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 03:03:25 localhost certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 03:03:25 localhost certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 03:03:25 localhost certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMy5 Jan 23 03:03:25 localhost certmonger[38997]: ip10VgjporvqA8mz7IfIlr1yMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU5MzEwMy5p Jan 23 03:03:25 localhost certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1 Jan 23 03:03:25 localhost certmonger[38997]: NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBE Jan 23 03:03:25 localhost certmonger[38997]: MEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1OTMxMDMu Jan 23 03:03:25 localhost certmonger[38997]: aW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGlqBJqbQosx Jan 23 03:03:25 localhost certmonger[38997]: A1GbPFjSBma2pBYOuVUgN2s6MA6TxX4ZQsB5VImI8D6wDBcLVqrm+E2Ir7ddKwCE Jan 23 03:03:25 localhost certmonger[38997]: PrCygBACRc86g4P9CHbngnxuIUTlxtj6hud7T9uVVfzS7XqaQ9DFRtRVOBk2YMbt Jan 23 03:03:25 localhost certmonger[38997]: uXL4QxXiFU/0T11fV1BFruOWS0K4qfks/2glhUz+uSoBdl9h4YJj9oY3CQTIXPZ5 Jan 23 03:03:25 localhost certmonger[38997]: QkDQAwSch0ePEH0slmvQ8UTFs22mOuhkOqXigWE8i0cAkbCraxTj3yGK7LMjhL9X Jan 23 03:03:25 localhost certmonger[38997]: 3xtWG5ptvzMoIQLVJxLYOD32tWYTu07Vae99L0DB6E3dwTni4pqJveIBmXQR627l Jan 23 03:03:25 localhost certmonger[38997]: Rser141dKZPD+2SDU9d/Nvab2RquewEt+dQipZdEdHF6SzL+RmL9GrK2nuwgDqpJ Jan 23 03:03:25 localhost certmonger[38997]: qCTScpN5KFF/o4gGBDOdKRokVQqlytw6mxYXovsT6Ks4+nxcfyvBxHf9UlQAs5jX Jan 23 03:03:25 localhost certmonger[38997]: zfVj/YRqJNo4Kylg0H0TE7N3YUpgGD+MpP7EHMGlsaR/LwBZklH4Dw== Jan 23 03:03:25 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:25 localhost certmonger[38997]: ". Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] No hooks set for pre-save command. Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost certmonger[39723]: Certificate in file "/etc/pki/tls/certs/httpd-internal_api.crt" issued by CA and saved. Jan 23 03:03:25 localhost certmonger[38997]: 2026-01-23 08:03:25 [38997] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost python3[39739]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005593103.external.ooo.test'] principal=['HTTP/np0005593103.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bf235b04-578b-4ed1-ac6f-09a385e8c37e Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fd8f79d2-0a60-4c68-8269-8bbe05e29eee Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.external.ooo.test" for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.external.ooo.test Jan 23 03:03:26 localhost certmonger[39749]: " for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593103.external.ooo.test@OOO.TEST Jan 23 03:03:26 localhost certmonger[39749]: " for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:26 localhost certmonger[39749]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTkzMTAzLmV4dGVybmFsLm9v Jan 23 03:03:26 localhost certmonger[39749]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApoFtZCS3kEV5 Jan 23 03:03:26 localhost certmonger[39749]: e3PF6vySngBHrO7d894hQ96vIpisdxvRAcUxGSFfsd21OV2YYMwUYPTqWqzyTimb Jan 23 03:03:26 localhost certmonger[39749]: pNpzmadqrt6wBWVvnpxYH3q/qFiA9AKp1Bcg6XYQJC/rXDwR1DMjEoQBNeCkwvH8 Jan 23 03:03:26 localhost certmonger[39749]: TZyRHwFSr8+SjBMmv837b2bURUkoDX5OPW42Mj3etMxy+OaltpeCRWdayV524GBm Jan 23 03:03:26 localhost certmonger[39749]: py+4ElorUSGR1Yfcdd4D/3/4qNsNBAluq5j/vsGlTidn3KxXqvs9S7J3S+Rih1ac Jan 23 03:03:26 localhost certmonger[39749]: 3XzfQmzCWJuPcECpoY6C5jIPDZptBD2UtPXvfjznK+6Eggs7wypAm4b/5Tpr3QbZ Jan 23 03:03:26 localhost certmonger[39749]: MKD35u74OQIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIA Jan 23 03:03:26 localhost certmonger[39749]: MwAwADgAMAAzADIANjCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Jan 23 03:03:26 localhost certmonger[39749]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDMuZXh0ZXJuYWwub29vLnRlc3Sg Jan 23 03:03:26 localhost certmonger[39749]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEwMy5leHRlcm5hbC5vb28u Jan 23 03:03:26 localhost certmonger[39749]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Jan 23 03:03:26 localhost certmonger[39749]: oSgwJhsESFRUUBsebnAwMDA1NTkzMTAzLmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Jan 23 03:03:26 localhost certmonger[39749]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Jan 23 03:03:26 localhost certmonger[39749]: BBT/ZJA+vvOuRUKjaP002LsE6uEgkDANBgkqhkiG9w0BAQsFAAOCAQEAgn4CIhf9 Jan 23 03:03:26 localhost certmonger[39749]: LiJ/ELYgp6OprVieuEgfE6AyReY9Y4923agSFoTpFU19GldU/ybX645ycNICq9k4 Jan 23 03:03:26 localhost certmonger[39749]: dZr+uZEPuC+4nyvH2pLEly/QE4VNM3y4xnA7DXiuRyCRuAFoloQcw33Cna083z6e Jan 23 03:03:26 localhost certmonger[39749]: //Vy4vq+6BULW5/t6khnFoCF2fRuLp1v0kvFCjXokz/L1cpPP+b7v3aROofpW7KG Jan 23 03:03:26 localhost certmonger[39749]: lhFkvS/hIH4dGHeTd/1GAKrCDKgItZdVXTZhp5y4ebcD1et0bdmGNDtJDQgndh2Q Jan 23 03:03:26 localhost certmonger[39749]: 1AHSkLqhKjKCE/c3T5mcL+QIfWxrQEuTP8R64jTPx08XL+cKP6G2hQwcRfJAQbr4 Jan 23 03:03:26 localhost certmonger[39749]: cDp3r6BY2K4kdw== Jan 23 03:03:26 localhost certmonger[39749]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:26 localhost certmonger[39749]: " for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCmgW1kJLeQRXl7c8Xq/JKeAEes7t3z3iFD3q8imKx3G9EBxTEZIV+x3bU5XZhgzBRg9OparPJOKZuk2nOZp2qu3rAFZW+enFgfer+oWID0AqnUFyDpdhAkL+tcPBHUMyMShAE14KTC8fxNnJEfAVKvz5KMEya/zftvZtRFSSgNfk49bjYyPd60zHL45qW2l4JFZ1rJXnbgYGanL7gSWitRIZHVh9x13gP/f/io2w0ECW6rmP++waVOJ2fcrFeq+z1LsndL5GKHVpzdfN9CbMJYm49wQKmhjoLmMg8Nmm0EPZS09e9+POcr7oSCCzvDKkCbhv/lOmvdBtkwoPfm7vg5AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAbABhJRG+0p4AF7v0mnjLaXu+ynvNW/4w9CbfIQK19jLK62J/CI6KsCrsO1CDNNzibiM9DVxRSGc8pVLxhC9iaBjYLpqucOE59Su5+Ai3wTKBYNbj2SQ5Kom5s7ksz3+ofIGbQSWp/qs7ULxPYIqC3Rim9ByUUCRsx/MBfMxnOHplBeeGZEpPeiQY96QIhXOSXrkO+dI2871t9/NGoDny2+91z3mcxaHBuZS07VNifcQu6LpYL+xQIwtuqMU+eqgLRKv2shEHJp4D5hDkodAPTClhDFNfZK9+44G7azBBpeLu+tzzvJI2jOxo0TVG/CrBCDqGoLtceP+APMoo79syHw==" for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApoFtZCS3kEV5e3PF6vySngBHrO7d894hQ96vIpisdxvRAcUxGSFfsd21OV2YYMwUYPTqWqzyTimbpNpzmadqrt6wBWVvnpxYH3q/qFiA9AKp1Bcg6XYQJC/rXDwR1DMjEoQBNeCkwvH8TZyRHwFSr8+SjBMmv837b2bURUkoDX5OPW42Mj3etMxy+OaltpeCRWdayV524GBmpy+4ElorUSGR1Yfcdd4D/3/4qNsNBAluq5j/vsGlTidn3KxXqvs9S7J3S+Rih1ac3XzfQmzCWJuPcECpoY6C5jIPDZptBD2UtPXvfjznK+6Eggs7wypAm4b/5Tpr3QbZMKD35u74OQIDAQAB" for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:26 localhost certmonger[39749]: 2026-01-23 08:03:26 [39749] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[39749]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 29435af9-2056-4caf-bf90-e5dec9127445 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c56bb062-1ce7-448a-8f7c-a83c50fffd46 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c56bb062-1ce7-448a-8f7c-a83c50fffd46 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b3d07120-0afd-4e09-9a6b-7ad27cbfaa92 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b3d07120-0afd-4e09-9a6b-7ad27cbfaa92 Jan 23 03:03:26 localhost certmonger[39749]: Certificate: "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" Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Certificate submission still ongoing. Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Certificate submission attempt complete. Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Child status = 0. Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Child output: Jan 23 03:03:26 localhost certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38997]: MIIFWTCCA8GgAwIBAgIRAL9PD4+aMLUEa/09/ikvf9gwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:26 localhost certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:26 localhost certmonger[38997]: cml0eTAeFw0yNjAxMjMwODAzMjZaFw0yODAxMjQwODAzMjZaMDwxETAPBgNVBAoM Jan 23 03:03:26 localhost certmonger[38997]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDMuZXh0ZXJuYWwub29vLnRl Jan 23 03:03:26 localhost certmonger[38997]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCmgW1kJLeQRXl7c8Xq Jan 23 03:03:26 localhost certmonger[38997]: /JKeAEes7t3z3iFD3q8imKx3G9EBxTEZIV+x3bU5XZhgzBRg9OparPJOKZuk2nOZ Jan 23 03:03:26 localhost certmonger[38997]: p2qu3rAFZW+enFgfer+oWID0AqnUFyDpdhAkL+tcPBHUMyMShAE14KTC8fxNnJEf Jan 23 03:03:26 localhost certmonger[38997]: AVKvz5KMEya/zftvZtRFSSgNfk49bjYyPd60zHL45qW2l4JFZ1rJXnbgYGanL7gS Jan 23 03:03:26 localhost certmonger[38997]: WitRIZHVh9x13gP/f/io2w0ECW6rmP++waVOJ2fcrFeq+z1LsndL5GKHVpzdfN9C Jan 23 03:03:26 localhost certmonger[38997]: bMJYm49wQKmhjoLmMg8Nmm0EPZS09e9+POcr7oSCCzvDKkCbhv/lOmvdBtkwoPfm Jan 23 03:03:26 localhost certmonger[38997]: 7vg5AgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 03:03:26 localhost certmonger[38997]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:26 localhost certmonger[38997]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 03:03:26 localhost certmonger[38997]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:26 localhost certmonger[38997]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 03:03:26 localhost certmonger[38997]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSu9qWn Jan 23 03:03:26 localhost certmonger[38997]: sh8ZauxJwAfST6oDyPR/VTCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDMuZXh0 Jan 23 03:03:26 localhost certmonger[38997]: ZXJuYWwub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw Jan 23 03:03:26 localhost certmonger[38997]: My5leHRlcm5hbC5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P Jan 23 03:03:26 localhost certmonger[38997]: Ty5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAzLmV4dGVybmFs Jan 23 03:03:26 localhost certmonger[38997]: Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQDUdLMYOHrQFpIqmXvlh7QHicTL Jan 23 03:03:26 localhost certmonger[38997]: JmB1YM9dI49h4nGCNHcH+pNsuAXcRT1IZGy5Be7CAFqE6JN9g6+R0ZfMUDUFprfW Jan 23 03:03:26 localhost certmonger[38997]: at3S9CjiGyHEPcXk/maySNmuS9Pjtg+4qHfGEm6foKT+atOkrQKzNaAx8YCJtCj2 Jan 23 03:03:26 localhost certmonger[38997]: nDic8a7ExCQPHCqDMPSKM8+n1463H6QAxT6geoGPyR/3SR7GKbiXpQC3KKmxtBPj Jan 23 03:03:26 localhost certmonger[38997]: 76saUXRrz+JG1uEt2SgCrmuxFpd5BKeLCo8jdmCcZs3Q2iZm3vkPdxp+losw2hzp Jan 23 03:03:26 localhost certmonger[38997]: UjkMKaAbz7wZWdT66Qksxe74gzjv/Dau9enCSg2+tVvJUG3JO+2jxIWEzJfXEbUK Jan 23 03:03:26 localhost certmonger[38997]: eIW1pXTVBUewN5mqnOxgb0S6DzM2mRNlaMhRXGKHmsBK4rjfk/Hm+hBVS5ML7OQf Jan 23 03:03:26 localhost certmonger[38997]: cHmGBjvpsap47TZw3roXuSOMUCknhtcXouUhV4y28vVUnr1HGunp77Cz9J/PQmR1 Jan 23 03:03:26 localhost certmonger[38997]: suxxY63Ci2ucqwa3Fnw36J+SnkozgqzTlEQiavM= Jan 23 03:03:26 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38997]: " Jan 23 03:03:26 localhost certmonger[39751]: 2026-01-23 08:03:26 [39751] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[39751]: MIIFWTCCA8GgAwIBAgIRAL9PD4+aMLUEa/09/ikvf9gwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:26 localhost certmonger[39751]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:26 localhost certmonger[39751]: cml0eTAeFw0yNjAxMjMwODAzMjZaFw0yODAxMjQwODAzMjZaMDwxETAPBgNVBAoM Jan 23 03:03:26 localhost certmonger[39751]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDMuZXh0ZXJuYWwub29vLnRl Jan 23 03:03:26 localhost certmonger[39751]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCmgW1kJLeQRXl7c8Xq Jan 23 03:03:26 localhost certmonger[39751]: /JKeAEes7t3z3iFD3q8imKx3G9EBxTEZIV+x3bU5XZhgzBRg9OparPJOKZuk2nOZ Jan 23 03:03:26 localhost certmonger[39751]: p2qu3rAFZW+enFgfer+oWID0AqnUFyDpdhAkL+tcPBHUMyMShAE14KTC8fxNnJEf Jan 23 03:03:26 localhost certmonger[39751]: AVKvz5KMEya/zftvZtRFSSgNfk49bjYyPd60zHL45qW2l4JFZ1rJXnbgYGanL7gS Jan 23 03:03:26 localhost certmonger[39751]: WitRIZHVh9x13gP/f/io2w0ECW6rmP++waVOJ2fcrFeq+z1LsndL5GKHVpzdfN9C Jan 23 03:03:26 localhost certmonger[39751]: bMJYm49wQKmhjoLmMg8Nmm0EPZS09e9+POcr7oSCCzvDKkCbhv/lOmvdBtkwoPfm Jan 23 03:03:26 localhost certmonger[39751]: 7vg5AgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 03:03:26 localhost certmonger[39751]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:26 localhost certmonger[39751]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 03:03:26 localhost certmonger[39751]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:26 localhost certmonger[39751]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 03:03:26 localhost certmonger[39751]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSu9qWn Jan 23 03:03:26 localhost certmonger[39751]: sh8ZauxJwAfST6oDyPR/VTCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDMuZXh0 Jan 23 03:03:26 localhost certmonger[39751]: ZXJuYWwub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw Jan 23 03:03:26 localhost certmonger[39751]: My5leHRlcm5hbC5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P Jan 23 03:03:26 localhost certmonger[39751]: Ty5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAzLmV4dGVybmFs Jan 23 03:03:26 localhost certmonger[39751]: Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQDUdLMYOHrQFpIqmXvlh7QHicTL Jan 23 03:03:26 localhost certmonger[39751]: JmB1YM9dI49h4nGCNHcH+pNsuAXcRT1IZGy5Be7CAFqE6JN9g6+R0ZfMUDUFprfW Jan 23 03:03:26 localhost certmonger[39751]: at3S9CjiGyHEPcXk/maySNmuS9Pjtg+4qHfGEm6foKT+atOkrQKzNaAx8YCJtCj2 Jan 23 03:03:26 localhost certmonger[39751]: nDic8a7ExCQPHCqDMPSKM8+n1463H6QAxT6geoGPyR/3SR7GKbiXpQC3KKmxtBPj Jan 23 03:03:26 localhost certmonger[39751]: 76saUXRrz+JG1uEt2SgCrmuxFpd5BKeLCo8jdmCcZs3Q2iZm3vkPdxp+losw2hzp Jan 23 03:03:26 localhost certmonger[39751]: UjkMKaAbz7wZWdT66Qksxe74gzjv/Dau9enCSg2+tVvJUG3JO+2jxIWEzJfXEbUK Jan 23 03:03:26 localhost certmonger[39751]: eIW1pXTVBUewN5mqnOxgb0S6DzM2mRNlaMhRXGKHmsBK4rjfk/Hm+hBVS5ML7OQf Jan 23 03:03:26 localhost certmonger[39751]: cHmGBjvpsap47TZw3roXuSOMUCknhtcXouUhV4y28vVUnr1HGunp77Cz9J/PQmR1 Jan 23 03:03:26 localhost certmonger[39751]: suxxY63Ci2ucqwa3Fnw36J+SnkozgqzTlEQiavM= Jan 23 03:03:26 localhost certmonger[39751]: -----END CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[39751]: ". Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Certificate submission still ongoing. Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Certificate submission postprocessing complete. Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Child status = 0. Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Child output: Jan 23 03:03:26 localhost certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFWTCCA8GgAwIBAgIRAL9PD4+aMLUEa/09/ikvf9gwDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAxMjMwODAzMjZaFw0yODAxMjQwODAzMjZaMDwxETAPBgNVBAoM\nCE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDMuZXh0ZXJuYWwub29vLnRl\nc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCmgW1kJLeQRXl7c8Xq\n/JKeAEes7t3z3iFD3q8imKx3G9EBxTEZIV+x3bU5XZhgzBRg9OparPJOKZuk2nOZ\np2qu3rAFZW+enFgfer+oWID0AqnUFyDpdhAkL+tcPBHUMyMShAE14KTC8fxNnJEf\nAVKvz5KMEya/zftvZtRFSSgNfk49bjYyPd60zHL45qW2l4JFZ1rJXnbgYGanL7gS\nWitRIZHVh9x13gP/f/io2w0ECW6rmP++waVOJ2fcrFeq+z1LsndL5GKHVpzdfN9C\nbMJYm49wQKmhjoLmMg8Nmm0EPZS09e9+POcr7oSCCzvDKkCbhv/lOmvdBtkwoPfm\n7vg5AgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy\nODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v\nLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH\nAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v\nLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj\nYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSu9qWn\nsh8ZauxJwAfST6oDyPR/VTCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDMuZXh0\nZXJuYWwub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw\nMy5leHRlcm5hbC5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P\nTy5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAzLmV4dGVybmFs\nLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQDUdLMYOHrQFpIqmXvlh7QHicTL\nJmB1YM9dI49h4nGCNHcH+pNsuAXcRT1IZGy5Be7CAFqE6JN9g6+R0ZfMUDUFprfW\nat3S9CjiGyHEPcXk/maySNmuS9Pjtg+4qHfGEm6foKT+atOkrQKzNaAx8YCJtCj2\nnDic8a7ExCQPHCqDMPSKM8+n1463H6QAxT6geoGPyR/3SR7GKbiXpQC3KKmxtBPj\n76saUXRrz+JG1uEt2SgCrmuxFpd5BKeLCo8jdmCcZs3Q2iZm3vkPdxp+losw2hzp\nUjkMKaAbz7wZWdT66Qksxe74gzjv/Dau9enCSg2+tVvJUG3JO+2jxIWEzJfXEbUK\neIW1pXTVBUewN5mqnOxgb0S6DzM2mRNlaMhRXGKHmsBK4rjfk/Hm+hBVS5ML7OQf\ncHmGBjvpsap47TZw3roXuSOMUCknhtcXouUhV4y28vVUnr1HGunp77Cz9J/PQmR1\nsuxxY63Ci2ucqwa3Fnw36J+SnkozgqzTlEQiavM=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:26 localhost certmonger[38997]: " Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38997]: MIIFWTCCA8GgAwIBAgIRAL9PD4+aMLUEa/09/ikvf9gwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:26 localhost certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:26 localhost certmonger[38997]: cml0eTAeFw0yNjAxMjMwODAzMjZaFw0yODAxMjQwODAzMjZaMDwxETAPBgNVBAoM Jan 23 03:03:26 localhost certmonger[38997]: CE9PTy5URVNUMScwJQYDVQQDDB5ucDAwMDU1OTMxMDMuZXh0ZXJuYWwub29vLnRl Jan 23 03:03:26 localhost certmonger[38997]: c3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCmgW1kJLeQRXl7c8Xq Jan 23 03:03:26 localhost certmonger[38997]: /JKeAEes7t3z3iFD3q8imKx3G9EBxTEZIV+x3bU5XZhgzBRg9OparPJOKZuk2nOZ Jan 23 03:03:26 localhost certmonger[38997]: p2qu3rAFZW+enFgfer+oWID0AqnUFyDpdhAkL+tcPBHUMyMShAE14KTC8fxNnJEf Jan 23 03:03:26 localhost certmonger[38997]: AVKvz5KMEya/zftvZtRFSSgNfk49bjYyPd60zHL45qW2l4JFZ1rJXnbgYGanL7gS Jan 23 03:03:26 localhost certmonger[38997]: WitRIZHVh9x13gP/f/io2w0ECW6rmP++waVOJ2fcrFeq+z1LsndL5GKHVpzdfN9C Jan 23 03:03:26 localhost certmonger[38997]: bMJYm49wQKmhjoLmMg8Nmm0EPZS09e9+POcr7oSCCzvDKkCbhv/lOmvdBtkwoPfm Jan 23 03:03:26 localhost certmonger[38997]: 7vg5AgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzy Jan 23 03:03:26 localhost certmonger[38997]: ODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:26 localhost certmonger[38997]: LnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 03:03:26 localhost certmonger[38997]: AwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29v Jan 23 03:03:26 localhost certmonger[38997]: LnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFj Jan 23 03:03:26 localhost certmonger[38997]: YTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSu9qWn Jan 23 03:03:26 localhost certmonger[38997]: sh8ZauxJwAfST6oDyPR/VTCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDMuZXh0 Jan 23 03:03:26 localhost certmonger[38997]: ZXJuYWwub29vLnRlc3SgPAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEw Jan 23 03:03:26 localhost certmonger[38997]: My5leHRlcm5hbC5vb28udGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9P Jan 23 03:03:26 localhost certmonger[38997]: Ty5URVNUoTEwL6ADAgEBoSgwJhsESFRUUBsebnAwMDA1NTkzMTAzLmV4dGVybmFs Jan 23 03:03:26 localhost certmonger[38997]: Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQDUdLMYOHrQFpIqmXvlh7QHicTL Jan 23 03:03:26 localhost certmonger[38997]: JmB1YM9dI49h4nGCNHcH+pNsuAXcRT1IZGy5Be7CAFqE6JN9g6+R0ZfMUDUFprfW Jan 23 03:03:26 localhost certmonger[38997]: at3S9CjiGyHEPcXk/maySNmuS9Pjtg+4qHfGEm6foKT+atOkrQKzNaAx8YCJtCj2 Jan 23 03:03:26 localhost certmonger[38997]: nDic8a7ExCQPHCqDMPSKM8+n1463H6QAxT6geoGPyR/3SR7GKbiXpQC3KKmxtBPj Jan 23 03:03:26 localhost certmonger[38997]: 76saUXRrz+JG1uEt2SgCrmuxFpd5BKeLCo8jdmCcZs3Q2iZm3vkPdxp+losw2hzp Jan 23 03:03:26 localhost certmonger[38997]: UjkMKaAbz7wZWdT66Qksxe74gzjv/Dau9enCSg2+tVvJUG3JO+2jxIWEzJfXEbUK Jan 23 03:03:26 localhost certmonger[38997]: eIW1pXTVBUewN5mqnOxgb0S6DzM2mRNlaMhRXGKHmsBK4rjfk/Hm+hBVS5ML7OQf Jan 23 03:03:26 localhost certmonger[38997]: cHmGBjvpsap47TZw3roXuSOMUCknhtcXouUhV4y28vVUnr1HGunp77Cz9J/PQmR1 Jan 23 03:03:26 localhost certmonger[38997]: suxxY63Ci2ucqwa3Fnw36J+SnkozgqzTlEQiavM= Jan 23 03:03:26 localhost certmonger[38997]: -----END CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38997]: ". Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] No hooks set for pre-save command. Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea4df386-0462-42e9-9867-037794bde344 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bf235b04-578b-4ed1-ac6f-09a385e8c37e Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost certmonger[39759]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Jan 23 03:03:26 localhost certmonger[38997]: 2026-01-23 08:03:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080326 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 76913aee-11c7-4456-8dd8-fffbddd6dcb7 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3949f135-e6d1-4baa-8357-2a11adc1976b Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e5c041e7-c4b3-4f69-b37a-6b5b535942e2 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5e751e47-b3b9-48a4-98bc-0bf0ee8a2a9e Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 268695d6-e882-485f-9811-8dd37ddd70b2 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 268695d6-e882-485f-9811-8dd37ddd70b2 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f380f973-03bd-4a88-8339-fa39dc8167ab Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost python3[39775]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 76913aee-11c7-4456-8dd8-fffbddd6dcb7 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9dfcaff-93cf-4336-8439-b9a92d154223 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 81acfec7-5107-4865-b431-4c36f21a877b Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aa3a04b9-0f0b-409a-9bb7-0b4b7e313477 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aa3a04b9-0f0b-409a-9bb7-0b4b7e313477 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 514885e5-f52e-4847-b79f-dd1c83ff8e2f Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:27 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 514885e5-f52e-4847-b79f-dd1c83ff8e2f Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:28 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:29 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:30 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cc8a890a-45ba-49e0-926a-731030ef34c3 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d11ffb60-cded-4a97-8f2a-7e4ba98e0e66 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fdcf0719-888c-40e5-940a-140868e11014 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bf235b04-578b-4ed1-ac6f-09a385e8c37e Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fd8f79d2-0a60-4c68-8269-8bbe05e29eee Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 29435af9-2056-4caf-bf90-e5dec9127445 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c56bb062-1ce7-448a-8f7c-a83c50fffd46 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c56bb062-1ce7-448a-8f7c-a83c50fffd46 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b3d07120-0afd-4e09-9a6b-7ad27cbfaa92 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b3d07120-0afd-4e09-9a6b-7ad27cbfaa92 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea4df386-0462-42e9-9867-037794bde344 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bf235b04-578b-4ed1-ac6f-09a385e8c37e Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 76913aee-11c7-4456-8dd8-fffbddd6dcb7 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3949f135-e6d1-4baa-8357-2a11adc1976b Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e5c041e7-c4b3-4f69-b37a-6b5b535942e2 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5e751e47-b3b9-48a4-98bc-0bf0ee8a2a9e Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 268695d6-e882-485f-9811-8dd37ddd70b2 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 268695d6-e882-485f-9811-8dd37ddd70b2 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f380f973-03bd-4a88-8339-fa39dc8167ab Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 76913aee-11c7-4456-8dd8-fffbddd6dcb7 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9dfcaff-93cf-4336-8439-b9a92d154223 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 81acfec7-5107-4865-b431-4c36f21a877b Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aa3a04b9-0f0b-409a-9bb7-0b4b7e313477 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aa3a04b9-0f0b-409a-9bb7-0b4b7e313477 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost kernel: VFS: idmapped mount is not enabled. Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 514885e5-f52e-4847-b79f-dd1c83ff8e2f Jan 23 03:03:31 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 514885e5-f52e-4847-b79f-dd1c83ff8e2f Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:32 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cc8a890a-45ba-49e0-926a-731030ef34c3 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d11ffb60-cded-4a97-8f2a-7e4ba98e0e66 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fdcf0719-888c-40e5-940a-140868e11014 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:33 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bf235b04-578b-4ed1-ac6f-09a385e8c37e Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fd8f79d2-0a60-4c68-8269-8bbe05e29eee Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 29435af9-2056-4caf-bf90-e5dec9127445 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c56bb062-1ce7-448a-8f7c-a83c50fffd46 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c56bb062-1ce7-448a-8f7c-a83c50fffd46 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b3d07120-0afd-4e09-9a6b-7ad27cbfaa92 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b3d07120-0afd-4e09-9a6b-7ad27cbfaa92 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea4df386-0462-42e9-9867-037794bde344 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bf235b04-578b-4ed1-ac6f-09a385e8c37e Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 76913aee-11c7-4456-8dd8-fffbddd6dcb7 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3949f135-e6d1-4baa-8357-2a11adc1976b Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e5c041e7-c4b3-4f69-b37a-6b5b535942e2 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5e751e47-b3b9-48a4-98bc-0bf0ee8a2a9e Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 268695d6-e882-485f-9811-8dd37ddd70b2 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 268695d6-e882-485f-9811-8dd37ddd70b2 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f380f973-03bd-4a88-8339-fa39dc8167ab Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 76913aee-11c7-4456-8dd8-fffbddd6dcb7 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9dfcaff-93cf-4336-8439-b9a92d154223 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 81acfec7-5107-4865-b431-4c36f21a877b Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aa3a04b9-0f0b-409a-9bb7-0b4b7e313477 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cc8a890a-45ba-49e0-926a-731030ef34c3 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d11ffb60-cded-4a97-8f2a-7e4ba98e0e66 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fdcf0719-888c-40e5-940a-140868e11014 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:34 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f35a7039-c144-4030-85e4-2f0c0e6634f4 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c56bb062-1ce7-448a-8f7c-a83c50fffd46 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c56bb062-1ce7-448a-8f7c-a83c50fffd46 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b3d07120-0afd-4e09-9a6b-7ad27cbfaa92 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b3d07120-0afd-4e09-9a6b-7ad27cbfaa92 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea4df386-0462-42e9-9867-037794bde344 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bf235b04-578b-4ed1-ac6f-09a385e8c37e Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 76913aee-11c7-4456-8dd8-fffbddd6dcb7 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3949f135-e6d1-4baa-8357-2a11adc1976b Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e5c041e7-c4b3-4f69-b37a-6b5b535942e2 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5e751e47-b3b9-48a4-98bc-0bf0ee8a2a9e Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 268695d6-e882-485f-9811-8dd37ddd70b2 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 268695d6-e882-485f-9811-8dd37ddd70b2 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f380f973-03bd-4a88-8339-fa39dc8167ab Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 76913aee-11c7-4456-8dd8-fffbddd6dcb7 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f9dfcaff-93cf-4336-8439-b9a92d154223 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 81acfec7-5107-4865-b431-4c36f21a877b Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aa3a04b9-0f0b-409a-9bb7-0b4b7e313477 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aa3a04b9-0f0b-409a-9bb7-0b4b7e313477 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 514885e5-f52e-4847-b79f-dd1c83ff8e2f Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 514885e5-f52e-4847-b79f-dd1c83ff8e2f Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cc8a890a-45ba-49e0-926a-731030ef34c3 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d11ffb60-cded-4a97-8f2a-7e4ba98e0e66 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fdcf0719-888c-40e5-940a-140868e11014 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:35 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f35a7039-c144-4030-85e4-2f0c0e6634f4 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 514885e5-f52e-4847-b79f-dd1c83ff8e2f Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:36 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cc8a890a-45ba-49e0-926a-731030ef34c3 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d11ffb60-cded-4a97-8f2a-7e4ba98e0e66 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fdcf0719-888c-40e5-940a-140868e11014 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9812003a-915e-422c-9170-09f880f9e773 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 44aa70a9-0efa-4620-a614-13b9f7af8137 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7e578e31-5f0d-4af9-bf46-cca72d404743 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f35a7039-c144-4030-85e4-2f0c0e6634f4 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 38fb35dd-5f41-4249-a6bc-73de970550cf Jan 23 03:03:37 localhost setroubleshoot[39604]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:43 localhost podman[39776]: 2026-01-23 08:03:27.487266321 +0000 UTC m=+0.034073163 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Jan 23 03:03:43 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:03:43 localhost python3[40004]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 cluster.common.tag/cinder-backup:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:43 localhost podman[40005]: 2026-01-23 08:03:43.673100515 +0000 UTC m=+0.040990404 image tag 01162f309a727f9f16ef893d348a6167be101f9c31f2a9a381f4a430ffc3b21a cluster.common.tag/cinder-backup:pcmklatest Jan 23 03:03:43 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:03:44 localhost python3[40031]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:46 localhost sshd[40070]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:03:47 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Jan 23 03:03:47 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.655s CPU time. Jan 23 03:03:47 localhost systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 23 03:03:47 localhost systemd[1]: setroubleshootd.service: Consumed 16.322s CPU time. Jan 23 03:03:48 localhost podman[40032]: 2026-01-23 08:03:44.235816553 +0000 UTC m=+0.043228074 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Jan 23 03:03:48 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:03:49 localhost python3[40101]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 cluster.common.tag/cinder-volume:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:49 localhost podman[40102]: 2026-01-23 08:03:49.124952913 +0000 UTC m=+0.050085587 image tag ccd22ddeb69c8f3a05d2d3f97d21f9fa64c6f2bc3a156f93212de7feacea314f cluster.common.tag/cinder-volume:pcmklatest Jan 23 03:03:49 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:03:49 localhost python3[40129]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:03:50 localhost python3[40146]: ansible-blockinfile Invoked with content=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 create=True path=/etc/rsyslog.d/openstack-haproxy.conf block=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:03:50 np0005593103 python3[40162]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 08:03:50 np0005593103 systemd[1]: Stopping System Logging Service... Jan 23 08:03:51 np0005593103 rsyslogd[759]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="759" x-info="https://www.rsyslog.com"] exiting on signal 15. Jan 23 08:03:51 np0005593103 systemd[1]: rsyslog.service: Deactivated successfully. Jan 23 08:03:51 np0005593103 systemd[1]: Stopped System Logging Service. Jan 23 08:03:51 np0005593103 systemd[1]: rsyslog.service: Consumed 1.356s CPU time, read 920.0K from disk, written 3.1M to disk. Jan 23 08:03:51 np0005593103 systemd[1]: Starting System Logging Service... Jan 23 08:03:51 np0005593103 rsyslogd[40165]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40165" x-info="https://www.rsyslog.com"] start Jan 23 08:03:51 np0005593103 systemd[1]: Started System Logging Service. Jan 23 08:03:51 np0005593103 rsyslogd[40165]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 08:03:51 np0005593103 python3[40185]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:03:56 np0005593103 podman[40186]: 2026-01-23 08:03:51.681964707 +0000 UTC m=+0.026626631 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Jan 23 08:03:56 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:03:56 np0005593103 python3[40252]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 cluster.common.tag/haproxy:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:03:56 np0005593103 podman[40253]: 2026-01-23 08:03:56.57986627 +0000 UTC m=+0.045342100 image tag bc0fbe6b9534c6b74951010de79a1ae57713cd63ed3f582d78ca1561a7041088 cluster.common.tag/haproxy:pcmklatest Jan 23 08:03:56 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:03:57 np0005593103 python3[40279]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:00 np0005593103 python3[40296]: ansible-systemd Invoked with enabled=True masked=False name=certmonger.service state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None Jan 23 08:04:00 np0005593103 python3[40315]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 08:04:00 np0005593103 python3[40331]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 08:04:01 np0005593103 python3[40347]: ansible-ansible.legacy.command Invoked with _raw_params=set -e#012ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012chmod 0644 ${ca_pem}#012update-ca-trust extract#012test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:04:02 np0005593103 python3[40373]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:04:03 np0005593103 python3[40393]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:06 np0005593103 python3[40410]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:10 np0005593103 python3[40427]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:12 np0005593103 python3[40466]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:13 np0005593103 python3[40714]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:04:14 np0005593103 python3[40732]: ansible-certificate_request Invoked with name=haproxy-external-cert dns=['overcloud.ooo.test'] ip=[] principal=['haproxy/overcloud.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-external-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012cp "/etc/pki/tls/private/haproxy-external-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012#012ca_type=ipa#012if [ "$ca_type" = "self-sign" ]; then#012 # refresh the ca cert just in case the ca cert has been renewed#012 ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012 openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012 chmod 0644 ${ca_pem}#012 update-ca-trust extract#012 test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 openssl x509 -in ${ca_pem} -out /tmp/cm-local-ca.pem#012 ca_path="/tmp/cm-local-ca.pem"#012else#012 ca_path="/etc/ipa/ca.crt"#012fi#012#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012service_pem="/etc/pki/tls/private/overcloud_endpoint.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:14 np0005593103 certmonger[38997]: 2026-01-23 08:04:14 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:14 np0005593103 certmonger[38997]: 2026-01-23 08:04:14 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:14 np0005593103 certmonger[38997]: 2026-01-23 08:04:14 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:14 np0005593103 certmonger[38997]: 2026-01-23 08:04:14 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:14 np0005593103 certmonger[38997]: 2026-01-23 08:04:14 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:14 np0005593103 certmonger[38997]: 2026-01-23 08:04:14 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:14 np0005593103 certmonger[38997]: 2026-01-23 08:04:14 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:14 np0005593103 certmonger[38997]: 2026-01-23 08:04:14 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:14 np0005593103 certmonger[38997]: 2026-01-23 08:04:14 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[38997]: 2026-01-23 08:04:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[38997]: 2026-01-23 08:04:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[38997]: 2026-01-23 08:04:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[38997]: 2026-01-23 08:04:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[38997]: 2026-01-23 08:04:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[38997]: 2026-01-23 08:04:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[38997]: 2026-01-23 08:04:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[38997]: 2026-01-23 08:04:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_REQ_SUBJECT" to "CN=overcloud.ooo.test" for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_REQ_HOSTNAME" to "overcloud.ooo.test Jan 23 08:04:15 np0005593103 certmonger[40742]: " for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/overcloud.ooo.test@OOO.TEST Jan 23 08:04:15 np0005593103 certmonger[40742]: " for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:15 np0005593103 certmonger[40742]: MIIDmjCCAoICAQAwHTEbMBkGA1UEAxMSb3ZlcmNsb3VkLm9vby50ZXN0MIIBIjAN Jan 23 08:04:15 np0005593103 certmonger[40742]: BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2BShlFjcZDpj7Sv+oUJKYmCQq3/8 Jan 23 08:04:15 np0005593103 certmonger[40742]: AH3OpowGv/v/Fj9X7j+mE4+KpA9LIU5sPX9yzlrKLegm/4Z0+g8GLcyxsUC5j6Qy Jan 23 08:04:15 np0005593103 certmonger[40742]: 089ZNL6EpkuDl7MjZk5WEkUrf8h4QIzA0XV8Qdja+LgqDJPtUQSX/tkQkjjQ6eQx Jan 23 08:04:15 np0005593103 certmonger[40742]: BHEH5Fi37/jxcZSns1VXfRb0xJNpEuUz/PFTzZBf+ZDshpt1hY2yxTNKqN0DA+6Z Jan 23 08:04:15 np0005593103 certmonger[40742]: C0D9ufzBjJU3Ta4vjZMogMtqNbrqhzelvS+3kUm8cOs2XJYentOAwixy20Vp+6pP Jan 23 08:04:15 np0005593103 certmonger[40742]: sLIhsG+vFu6g2Dl8iAQVOqWWX2O72LmUPktFZxjocA3bxsGDoOU6SxamqwIDAQAB Jan 23 08:04:15 np0005593103 certmonger[40742]: oIIBNjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIAMwAwADgAMAA0ADEA Jan 23 08:04:15 np0005593103 certmonger[40742]: NDCCAQUGCSqGSIb3DQEJDjGB9zCB9DALBgNVHQ8EBAMCBaAwgZgGA1UdEQSBkDCB Jan 23 08:04:15 np0005593103 certmonger[40742]: jYISb3ZlcmNsb3VkLm9vby50ZXN0oDMGCisGAQQBgjcUAgOgJQwjaGFwcm94eS9v Jan 23 08:04:15 np0005593103 certmonger[40742]: dmVyY2xvdWQub29vLnRlc3RAT09PLlRFU1SgQgYGKwYBBQICoDgwNqAKGwhPT08u Jan 23 08:04:15 np0005593103 certmonger[40742]: VEVTVKEoMCagAwIBAaEfMB0bB2hhcHJveHkbEm92ZXJjbG91ZC5vb28udGVzdDAd Jan 23 08:04:15 np0005593103 certmonger[40742]: BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNV Jan 23 08:04:15 np0005593103 certmonger[40742]: HQ4EFgQU4zxlQqFmkcKqy/99xm+iCrQk4jkwDQYJKoZIhvcNAQELBQADggEBAB88 Jan 23 08:04:15 np0005593103 certmonger[40742]: yr+mDKf6CHk4rX1dDAO4IIB52Z0ZHuq31nMyFvscPtvn7uK37LKM7NncD3jf08Wv Jan 23 08:04:15 np0005593103 certmonger[40742]: AzCnChuLmkPn4zg8Ka/AT15qj60cQvE4YuDfxhze9JtWrWHfdHOIkokPaRJJ1ciZ Jan 23 08:04:15 np0005593103 certmonger[40742]: kgin6K1KwPlEyiiwP0dEb1Gxg8Jb3QVlAM0kiZavQFVco9spXnG/sNXsqil9Yo+p Jan 23 08:04:15 np0005593103 certmonger[40742]: fG6yZVTrPeaJZentRvJ1kkf1rqCwZBSjMm2dmG90a2BK9XPDFQQoKpYQbbxZOhxZ Jan 23 08:04:15 np0005593103 certmonger[40742]: 2jzQyAoPId8Ska0j48DZXFE1/AMKx1KuQGb6QgGukrz0N/Ttx73DyH5W9Ap4Gy3v Jan 23 08:04:15 np0005593103 certmonger[40742]: PSEYf5wVn/sKF+CTL+c= Jan 23 08:04:15 np0005593103 certmonger[40742]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:15 np0005593103 certmonger[40742]: " for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2BShlFjcZDpj7Sv+oUJKYmCQq3/8AH3OpowGv/v/Fj9X7j+mE4+KpA9LIU5sPX9yzlrKLegm/4Z0+g8GLcyxsUC5j6Qy089ZNL6EpkuDl7MjZk5WEkUrf8h4QIzA0XV8Qdja+LgqDJPtUQSX/tkQkjjQ6eQxBHEH5Fi37/jxcZSns1VXfRb0xJNpEuUz/PFTzZBf+ZDshpt1hY2yxTNKqN0DA+6ZC0D9ufzBjJU3Ta4vjZMogMtqNbrqhzelvS+3kUm8cOs2XJYentOAwixy20Vp+6pPsLIhsG+vFu6g2Dl8iAQVOqWWX2O72LmUPktFZxjocA3bxsGDoOU6SxamqwIDAQAB" for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:15 np0005593103 certmonger[40742]: 2026-01-23 08:04:15 [40742] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:15 np0005593103 certmonger[38997]: 2026-01-23 08:04:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:15 np0005593103 certmonger[40742]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:16 np0005593103 certmonger[40742]: Certificate: "MIIFLzCCA5egAwIBAgIRAMA7WRe5ns5mM9wAHXDBnR0wDQYJKoZIhvcNAQELBQAwMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0yNjAxMjMwODA0MTVaFw0yODAxMjQwODA0MTVaMDAxETAPBgNVBAoMCE9PTy5URVNUMRswGQYDVQQDDBJvdmVyY2xvdWQub29vLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDYFKGUWNxkOmPtK/6hQkpiYJCrf/wAfc6mjAa/+/8WP1fuP6YTj4qkD0shTmw9f3LOWsot6Cb/hnT6DwYtzLGxQLmPpDLTz1k0voSmS4OXsyNmTlYSRSt/yHhAjMDRdXxB2Nr4uCoMk+1RBJf+2RCSONDp5DEEcQfkWLfv+PFxlKezVVd9FvTEk2kS5TP88VPNkF/5kOyGm3WFjbLFM0qo3QMD7pkLQP25/MGMlTdNri+NkyiAy2o1uuqHN6W9L7eRSbxw6zZclh6e04DCLHLbRWn7qk+wsiGwb68W7qDYOXyIBBU6pZZfY7vYuZQ+S0VnGOhwDdvGwYOg5TpLFqarAgMBAAGjggG/MIIBuzAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTqQPyfdg/UwcHAt364prHfgM2BSTCBmAYDVR0RBIGQMIGNghJvdmVyY2xvdWQub29vLnRlc3SgMwYKKwYBBAGCNxQCA6AlDCNoYXByb3h5L292ZXJjbG91ZC5vb28udGVzdEBPT08uVEVTVKBCBgYrBgEFAgKgODA2oAobCE9PTy5URVNUoSgwJqADAgEBoR8wHRsHaGFwcm94eRsSb3ZlcmNsb3VkLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAlUBLVz+JpY7qsfhc+fJadpL0JryVCStbgGJR8me10rA2k0R0hnNkEuFnjXA+q3UH1B+ZDkQk7YLshM5koHuikH9q4QM5Saf9BI94ISIspJY9LPfhM9qYm8/yAfkUZBxIyCBFv/H6ot90xCgCv257t4+UCqGjfawdqjMMp4m2hZZjqyYdpN46/ZG4d/Jjea8wTMFhW0ZZzReVGGdgRRvAuJMDoyTm3/8WbYD268IiqlXLylFnKpKVIudlxpfbZ6SwM6BCDM9jEdI3N9rai4v6k96hhME58j+xBkKYmc+oUrJqP/zkhTDQHi4XZdWp7Ml7f/WeKLLZ533j2RwNoS2W48Xsh41btqHYItbLC+zp6fxcthxm0zk36R/FJcxFjssnGtwpKzgtV55SCTNHBdVBinC4MD1SlYCoYolPrERwiej4CncujI+qE3Vmk9UTulDE1sIctI/QhEFUH3f9eS3T1LDEMQ1dIrRb+R/Ahff5zDdOCWs+rfL299u8i7MgnWzE=" Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Certificate submission still ongoing. Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Certificate submission attempt complete. Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Child status = 0. Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Child output: Jan 23 08:04:16 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:16 np0005593103 certmonger[38997]: MIIFLzCCA5egAwIBAgIRAMA7WRe5ns5mM9wAHXDBnR0wDQYJKoZIhvcNAQELBQAw Jan 23 08:04:16 np0005593103 certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:16 np0005593103 certmonger[38997]: cml0eTAeFw0yNjAxMjMwODA0MTVaFw0yODAxMjQwODA0MTVaMDAxETAPBgNVBAoM Jan 23 08:04:16 np0005593103 certmonger[38997]: CE9PTy5URVNUMRswGQYDVQQDDBJvdmVyY2xvdWQub29vLnRlc3QwggEiMA0GCSqG Jan 23 08:04:16 np0005593103 certmonger[38997]: SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDYFKGUWNxkOmPtK/6hQkpiYJCrf/wAfc6m Jan 23 08:04:16 np0005593103 certmonger[38997]: jAa/+/8WP1fuP6YTj4qkD0shTmw9f3LOWsot6Cb/hnT6DwYtzLGxQLmPpDLTz1k0 Jan 23 08:04:16 np0005593103 certmonger[38997]: voSmS4OXsyNmTlYSRSt/yHhAjMDRdXxB2Nr4uCoMk+1RBJf+2RCSONDp5DEEcQfk Jan 23 08:04:16 np0005593103 certmonger[38997]: WLfv+PFxlKezVVd9FvTEk2kS5TP88VPNkF/5kOyGm3WFjbLFM0qo3QMD7pkLQP25 Jan 23 08:04:16 np0005593103 certmonger[38997]: /MGMlTdNri+NkyiAy2o1uuqHN6W9L7eRSbxw6zZclh6e04DCLHLbRWn7qk+wsiGw Jan 23 08:04:16 np0005593103 certmonger[38997]: b68W7qDYOXyIBBU6pZZfY7vYuZQ+S0VnGOhwDdvGwYOg5TpLFqarAgMBAAGjggG/ Jan 23 08:04:16 np0005593103 certmonger[38997]: MIIBuzAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcB Jan 23 08:04:16 np0005593103 certmonger[38997]: AQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2Nz Jan 23 08:04:16 np0005593103 certmonger[38997]: cDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC Jan 23 08:04:16 np0005593103 certmonger[38997]: MHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2Ny Jan 23 08:04:16 np0005593103 certmonger[38997]: bC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwV Jan 23 08:04:16 np0005593103 certmonger[38997]: Q2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTqQPyfdg/UwcHAt364prHf Jan 23 08:04:16 np0005593103 certmonger[38997]: gM2BSTCBmAYDVR0RBIGQMIGNghJvdmVyY2xvdWQub29vLnRlc3SgMwYKKwYBBAGC Jan 23 08:04:16 np0005593103 certmonger[38997]: NxQCA6AlDCNoYXByb3h5L292ZXJjbG91ZC5vb28udGVzdEBPT08uVEVTVKBCBgYr Jan 23 08:04:16 np0005593103 certmonger[38997]: BgEFAgKgODA2oAobCE9PTy5URVNUoSgwJqADAgEBoR8wHRsHaGFwcm94eRsSb3Zl Jan 23 08:04:16 np0005593103 certmonger[38997]: cmNsb3VkLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAlUBLVz+JpY7qsfhc+ Jan 23 08:04:16 np0005593103 certmonger[38997]: fJadpL0JryVCStbgGJR8me10rA2k0R0hnNkEuFnjXA+q3UH1B+ZDkQk7YLshM5ko Jan 23 08:04:16 np0005593103 certmonger[38997]: HuikH9q4QM5Saf9BI94ISIspJY9LPfhM9qYm8/yAfkUZBxIyCBFv/H6ot90xCgCv Jan 23 08:04:16 np0005593103 certmonger[38997]: 257t4+UCqGjfawdqjMMp4m2hZZjqyYdpN46/ZG4d/Jjea8wTMFhW0ZZzReVGGdgR Jan 23 08:04:16 np0005593103 certmonger[38997]: RvAuJMDoyTm3/8WbYD268IiqlXLylFnKpKVIudlxpfbZ6SwM6BCDM9jEdI3N9rai Jan 23 08:04:16 np0005593103 certmonger[38997]: 4v6k96hhME58j+xBkKYmc+oUrJqP/zkhTDQHi4XZdWp7Ml7f/WeKLLZ533j2RwNo Jan 23 08:04:16 np0005593103 certmonger[38997]: S2W48Xsh41btqHYItbLC+zp6fxcthxm0zk36R/FJcxFjssnGtwpKzgtV55SCTNHB Jan 23 08:04:16 np0005593103 certmonger[38997]: dVBinC4MD1SlYCoYolPrERwiej4CncujI+qE3Vmk9UTulDE1sIctI/QhEFUH3f9e Jan 23 08:04:16 np0005593103 certmonger[38997]: S3T1LDEMQ1dIrRb+R/Ahff5zDdOCWs+rfL299u8i7MgnWzE= Jan 23 08:04:16 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:16 np0005593103 certmonger[38997]: " Jan 23 08:04:16 np0005593103 certmonger[40744]: 2026-01-23 08:04:16 [40744] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:16 np0005593103 certmonger[40744]: MIIFLzCCA5egAwIBAgIRAMA7WRe5ns5mM9wAHXDBnR0wDQYJKoZIhvcNAQELBQAw Jan 23 08:04:16 np0005593103 certmonger[40744]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:16 np0005593103 certmonger[40744]: cml0eTAeFw0yNjAxMjMwODA0MTVaFw0yODAxMjQwODA0MTVaMDAxETAPBgNVBAoM Jan 23 08:04:16 np0005593103 certmonger[40744]: CE9PTy5URVNUMRswGQYDVQQDDBJvdmVyY2xvdWQub29vLnRlc3QwggEiMA0GCSqG Jan 23 08:04:16 np0005593103 certmonger[40744]: SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDYFKGUWNxkOmPtK/6hQkpiYJCrf/wAfc6m Jan 23 08:04:16 np0005593103 certmonger[40744]: jAa/+/8WP1fuP6YTj4qkD0shTmw9f3LOWsot6Cb/hnT6DwYtzLGxQLmPpDLTz1k0 Jan 23 08:04:16 np0005593103 certmonger[40744]: voSmS4OXsyNmTlYSRSt/yHhAjMDRdXxB2Nr4uCoMk+1RBJf+2RCSONDp5DEEcQfk Jan 23 08:04:16 np0005593103 certmonger[40744]: WLfv+PFxlKezVVd9FvTEk2kS5TP88VPNkF/5kOyGm3WFjbLFM0qo3QMD7pkLQP25 Jan 23 08:04:16 np0005593103 certmonger[40744]: /MGMlTdNri+NkyiAy2o1uuqHN6W9L7eRSbxw6zZclh6e04DCLHLbRWn7qk+wsiGw Jan 23 08:04:16 np0005593103 certmonger[40744]: b68W7qDYOXyIBBU6pZZfY7vYuZQ+S0VnGOhwDdvGwYOg5TpLFqarAgMBAAGjggG/ Jan 23 08:04:16 np0005593103 certmonger[40744]: MIIBuzAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcB Jan 23 08:04:16 np0005593103 certmonger[40744]: AQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2Nz Jan 23 08:04:16 np0005593103 certmonger[40744]: cDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC Jan 23 08:04:16 np0005593103 certmonger[40744]: MHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2Ny Jan 23 08:04:16 np0005593103 certmonger[40744]: bC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwV Jan 23 08:04:16 np0005593103 certmonger[40744]: Q2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTqQPyfdg/UwcHAt364prHf Jan 23 08:04:16 np0005593103 certmonger[40744]: gM2BSTCBmAYDVR0RBIGQMIGNghJvdmVyY2xvdWQub29vLnRlc3SgMwYKKwYBBAGC Jan 23 08:04:16 np0005593103 certmonger[40744]: NxQCA6AlDCNoYXByb3h5L292ZXJjbG91ZC5vb28udGVzdEBPT08uVEVTVKBCBgYr Jan 23 08:04:16 np0005593103 certmonger[40744]: BgEFAgKgODA2oAobCE9PTy5URVNUoSgwJqADAgEBoR8wHRsHaGFwcm94eRsSb3Zl Jan 23 08:04:16 np0005593103 certmonger[40744]: cmNsb3VkLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAlUBLVz+JpY7qsfhc+ Jan 23 08:04:16 np0005593103 certmonger[40744]: fJadpL0JryVCStbgGJR8me10rA2k0R0hnNkEuFnjXA+q3UH1B+ZDkQk7YLshM5ko Jan 23 08:04:16 np0005593103 certmonger[40744]: HuikH9q4QM5Saf9BI94ISIspJY9LPfhM9qYm8/yAfkUZBxIyCBFv/H6ot90xCgCv Jan 23 08:04:16 np0005593103 certmonger[40744]: 257t4+UCqGjfawdqjMMp4m2hZZjqyYdpN46/ZG4d/Jjea8wTMFhW0ZZzReVGGdgR Jan 23 08:04:16 np0005593103 certmonger[40744]: RvAuJMDoyTm3/8WbYD268IiqlXLylFnKpKVIudlxpfbZ6SwM6BCDM9jEdI3N9rai Jan 23 08:04:16 np0005593103 certmonger[40744]: 4v6k96hhME58j+xBkKYmc+oUrJqP/zkhTDQHi4XZdWp7Ml7f/WeKLLZ533j2RwNo Jan 23 08:04:16 np0005593103 certmonger[40744]: S2W48Xsh41btqHYItbLC+zp6fxcthxm0zk36R/FJcxFjssnGtwpKzgtV55SCTNHB Jan 23 08:04:16 np0005593103 certmonger[40744]: dVBinC4MD1SlYCoYolPrERwiej4CncujI+qE3Vmk9UTulDE1sIctI/QhEFUH3f9e Jan 23 08:04:16 np0005593103 certmonger[40744]: S3T1LDEMQ1dIrRb+R/Ahff5zDdOCWs+rfL299u8i7MgnWzE= Jan 23 08:04:16 np0005593103 certmonger[40744]: -----END CERTIFICATE----- Jan 23 08:04:16 np0005593103 certmonger[40744]: ". Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Certificate submission still ongoing. Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Certificate submission postprocessing complete. Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Child status = 0. Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Child output: Jan 23 08:04:16 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nS3T1LDEMQ1dIrRb+R/Ahff5zDdOCWs+rfL299u8i7MgnWzE=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:16 np0005593103 certmonger[38997]: " Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:16 np0005593103 certmonger[38997]: MIIFLzCCA5egAwIBAgIRAMA7WRe5ns5mM9wAHXDBnR0wDQYJKoZIhvcNAQELBQAw Jan 23 08:04:16 np0005593103 certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:16 np0005593103 certmonger[38997]: cml0eTAeFw0yNjAxMjMwODA0MTVaFw0yODAxMjQwODA0MTVaMDAxETAPBgNVBAoM Jan 23 08:04:16 np0005593103 certmonger[38997]: CE9PTy5URVNUMRswGQYDVQQDDBJvdmVyY2xvdWQub29vLnRlc3QwggEiMA0GCSqG Jan 23 08:04:16 np0005593103 certmonger[38997]: SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDYFKGUWNxkOmPtK/6hQkpiYJCrf/wAfc6m Jan 23 08:04:16 np0005593103 certmonger[38997]: jAa/+/8WP1fuP6YTj4qkD0shTmw9f3LOWsot6Cb/hnT6DwYtzLGxQLmPpDLTz1k0 Jan 23 08:04:16 np0005593103 certmonger[38997]: voSmS4OXsyNmTlYSRSt/yHhAjMDRdXxB2Nr4uCoMk+1RBJf+2RCSONDp5DEEcQfk Jan 23 08:04:16 np0005593103 certmonger[38997]: WLfv+PFxlKezVVd9FvTEk2kS5TP88VPNkF/5kOyGm3WFjbLFM0qo3QMD7pkLQP25 Jan 23 08:04:16 np0005593103 certmonger[38997]: /MGMlTdNri+NkyiAy2o1uuqHN6W9L7eRSbxw6zZclh6e04DCLHLbRWn7qk+wsiGw Jan 23 08:04:16 np0005593103 certmonger[38997]: b68W7qDYOXyIBBU6pZZfY7vYuZQ+S0VnGOhwDdvGwYOg5TpLFqarAgMBAAGjggG/ Jan 23 08:04:16 np0005593103 certmonger[38997]: MIIBuzAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcB Jan 23 08:04:16 np0005593103 certmonger[38997]: AQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2Nz Jan 23 08:04:16 np0005593103 certmonger[38997]: cDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC Jan 23 08:04:16 np0005593103 certmonger[38997]: MHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2Ny Jan 23 08:04:16 np0005593103 certmonger[38997]: bC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwV Jan 23 08:04:16 np0005593103 certmonger[38997]: Q2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBTqQPyfdg/UwcHAt364prHf Jan 23 08:04:16 np0005593103 certmonger[38997]: gM2BSTCBmAYDVR0RBIGQMIGNghJvdmVyY2xvdWQub29vLnRlc3SgMwYKKwYBBAGC Jan 23 08:04:16 np0005593103 certmonger[38997]: NxQCA6AlDCNoYXByb3h5L292ZXJjbG91ZC5vb28udGVzdEBPT08uVEVTVKBCBgYr Jan 23 08:04:16 np0005593103 certmonger[38997]: BgEFAgKgODA2oAobCE9PTy5URVNUoSgwJqADAgEBoR8wHRsHaGFwcm94eRsSb3Zl Jan 23 08:04:16 np0005593103 certmonger[38997]: cmNsb3VkLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAlUBLVz+JpY7qsfhc+ Jan 23 08:04:16 np0005593103 certmonger[38997]: fJadpL0JryVCStbgGJR8me10rA2k0R0hnNkEuFnjXA+q3UH1B+ZDkQk7YLshM5ko Jan 23 08:04:16 np0005593103 certmonger[38997]: HuikH9q4QM5Saf9BI94ISIspJY9LPfhM9qYm8/yAfkUZBxIyCBFv/H6ot90xCgCv Jan 23 08:04:16 np0005593103 certmonger[38997]: 257t4+UCqGjfawdqjMMp4m2hZZjqyYdpN46/ZG4d/Jjea8wTMFhW0ZZzReVGGdgR Jan 23 08:04:16 np0005593103 certmonger[38997]: RvAuJMDoyTm3/8WbYD268IiqlXLylFnKpKVIudlxpfbZ6SwM6BCDM9jEdI3N9rai Jan 23 08:04:16 np0005593103 certmonger[38997]: 4v6k96hhME58j+xBkKYmc+oUrJqP/zkhTDQHi4XZdWp7Ml7f/WeKLLZ533j2RwNo Jan 23 08:04:16 np0005593103 certmonger[38997]: S2W48Xsh41btqHYItbLC+zp6fxcthxm0zk36R/FJcxFjssnGtwpKzgtV55SCTNHB Jan 23 08:04:16 np0005593103 certmonger[38997]: dVBinC4MD1SlYCoYolPrERwiej4CncujI+qE3Vmk9UTulDE1sIctI/QhEFUH3f9e Jan 23 08:04:16 np0005593103 certmonger[38997]: S3T1LDEMQ1dIrRb+R/Ahff5zDdOCWs+rfL299u8i7MgnWzE= Jan 23 08:04:16 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:16 np0005593103 certmonger[38997]: ". Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] No hooks set for pre-save command. Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:16 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 certmonger[40816]: Certificate in file "/etc/pki/tls/certs/haproxy-external-cert.crt" issued by CA and saved. Jan 23 08:04:16 np0005593103 certmonger[38997]: 2026-01-23 08:04:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080414 Jan 23 08:04:16 np0005593103 python3[40832]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 08:04:17 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:17 np0005593103 python3[40848]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 08:04:17 np0005593103 python3[40864]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:04:18 np0005593103 python3[40884]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:21 np0005593103 python3[40901]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:24 np0005593103 python3[41104]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:25 np0005593103 python3[41120]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:25 np0005593103 python3[41136]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:04:26 np0005593103 python3[41154]: ansible-certificate_request Invoked with name=haproxy-ctlplane-cert dns=['np0005593103.ctlplane.ooo.test', 'overcloud.ctlplane.ooo.test'] principal=['haproxy/np0005593103.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012cp "/etc/pki/tls/private/haproxy-ctlplane-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.ctlplane.ooo.test" for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.ctlplane.ooo.test Jan 23 08:04:26 np0005593103 certmonger[41164]: overcloud.ctlplane.ooo.test Jan 23 08:04:26 np0005593103 certmonger[41164]: " for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005593103.ctlplane.ooo.test@OOO.TEST Jan 23 08:04:26 np0005593103 certmonger[41164]: " for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:26 np0005593103 certmonger[41164]: MIID6TCCAtECAQAwKTEnMCUGA1UEAxMebnAwMDA1NTkzMTAzLmN0bHBsYW5lLm9v Jan 23 08:04:26 np0005593103 certmonger[41164]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqaCTw8098bcF Jan 23 08:04:26 np0005593103 certmonger[41164]: gz6PoCXyW6FgNA7O+plPl4d3tDg4zZFgMjzTDhI1cykJfEzYlX8LhcE89vo3QK01 Jan 23 08:04:26 np0005593103 certmonger[41164]: hUwGtLV8DztWY5qE4oGddQDPrMOPg7MTe5RU/p4tui+vp9RfdZoifCQu/CLmAs1s Jan 23 08:04:26 np0005593103 certmonger[41164]: pduKPmsU7drjO9YrfJGL69qMkOreizFJ/1Taqk15PT5UNKAdBj9ul57oYvMBkTzL Jan 23 08:04:26 np0005593103 certmonger[41164]: q4DMeK3Cr7pK7h90dpICjJJXVSJSIlY51AzXE6co3HgzrD+PmYY2BbL/lWNWoz9+ Jan 23 08:04:26 np0005593103 certmonger[41164]: Nb98eLCQL0a99nU7/fH/+VZlNNZx4+ImX8BPVidLhTIzOLSM7O0nBvlataMC/GV+ Jan 23 08:04:26 np0005593103 certmonger[41164]: ZErb8F46tQIDAQABoIIBeTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIA Jan 23 08:04:26 np0005593103 certmonger[41164]: MwAwADgAMAA0ADIANjCCAUgGCSqGSIb3DQEJDjGCATkwggE1MAsGA1UdDwQEAwIF Jan 23 08:04:26 np0005593103 certmonger[41164]: oDCB2QYDVR0RBIHRMIHOgh5ucDAwMDU1OTMxMDMuY3RscGxhbmUub29vLnRlc3SC Jan 23 08:04:26 np0005593103 certmonger[41164]: G292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML2hh Jan 23 08:04:26 np0005593103 certmonger[41164]: cHJveHkvbnAwMDA1NTkzMTAzLmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoE4G Jan 23 08:04:26 np0005593103 certmonger[41164]: BisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwdoYXByb3h5Gx5u Jan 23 08:04:26 np0005593103 certmonger[41164]: cDAwMDU1OTMxMDMuY3RscGxhbmUub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUH Jan 23 08:04:26 np0005593103 certmonger[41164]: AwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFNC68e7ilsQJp0Bt Jan 23 08:04:26 np0005593103 certmonger[41164]: gkWh0nYo3lEXMA0GCSqGSIb3DQEBCwUAA4IBAQBWJs21J/WdigZOYrFoYzsgZIoB Jan 23 08:04:26 np0005593103 certmonger[41164]: Chm5tKu783v9VgEz5tPL2zD4YPf2AMhAD5LGQX8HpT20k0k0X408iMWyS6KbMSop Jan 23 08:04:26 np0005593103 certmonger[41164]: O4llpZiAhxAnD2m/Za6oS5UVlV1ceTophBOSoolFslKNk5vcI7MT+DDTENldAQJC Jan 23 08:04:26 np0005593103 certmonger[41164]: wEpEIZDAduUppDXKNuLbY6ijvOA3gEYCtTgdPyLV/Qkxm0mTIFmmLGezycTLKQ12 Jan 23 08:04:26 np0005593103 certmonger[41164]: YkazaOZ5xYKSeEFYof8DggpgwyWx8yS9j5XcGA4pH+TIoYZcyjkJhvkOfJxv65+m Jan 23 08:04:26 np0005593103 certmonger[41164]: KHuAZjZVYmyju6CJ8IF+m4qI/08wStQlIVTVSu6dwTkd2t2Nl7PiGl72qQHH Jan 23 08:04:26 np0005593103 certmonger[41164]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:26 np0005593103 certmonger[41164]: " for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqaCTw8098bcFgz6PoCXyW6FgNA7O+plPl4d3tDg4zZFgMjzTDhI1cykJfEzYlX8LhcE89vo3QK01hUwGtLV8DztWY5qE4oGddQDPrMOPg7MTe5RU/p4tui+vp9RfdZoifCQu/CLmAs1spduKPmsU7drjO9YrfJGL69qMkOreizFJ/1Taqk15PT5UNKAdBj9ul57oYvMBkTzLq4DMeK3Cr7pK7h90dpICjJJXVSJSIlY51AzXE6co3HgzrD+PmYY2BbL/lWNWoz9+Nb98eLCQL0a99nU7/fH/+VZlNNZx4+ImX8BPVidLhTIzOLSM7O0nBvlataMC/GV+ZErb8F46tQIDAQAB" for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:26 np0005593103 certmonger[41164]: 2026-01-23 08:04:26 [41164] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:26 np0005593103 certmonger[38997]: 2026-01-23 08:04:26 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:26 np0005593103 certmonger[41164]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:27 np0005593103 certmonger[41164]: Certificate: "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" Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Certificate submission still ongoing. Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Certificate submission attempt complete. Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Child status = 0. Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Child output: Jan 23 08:04:27 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:27 np0005593103 certmonger[38997]: MIIFezCCA+OgAwIBAgIQdsoZHxzSa2/VjDv+3VYpRjANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:27 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:27 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDQyN1oXDTI4MDEyNDA4MDQyN1owPDERMA8GA1UECgwI Jan 23 08:04:27 np0005593103 certmonger[38997]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMy5jdGxwbGFuZS5vb28udGVz Jan 23 08:04:27 np0005593103 certmonger[38997]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKmgk8PNPfG3BYM+j6Al Jan 23 08:04:27 np0005593103 certmonger[38997]: 8luhYDQOzvqZT5eHd7Q4OM2RYDI80w4SNXMpCXxM2JV/C4XBPPb6N0CtNYVMBrS1 Jan 23 08:04:27 np0005593103 certmonger[38997]: fA87VmOahOKBnXUAz6zDj4OzE3uUVP6eLbovr6fUX3WaInwkLvwi5gLNbKXbij5r Jan 23 08:04:27 np0005593103 certmonger[38997]: FO3a4zvWK3yRi+vajJDq3osxSf9U2qpNeT0+VDSgHQY/bpee6GLzAZE8y6uAzHit Jan 23 08:04:27 np0005593103 certmonger[38997]: wq+6Su4fdHaSAoySV1UiUiJWOdQM1xOnKNx4M6w/j5mGNgWy/5VjVqM/fjW/fHiw Jan 23 08:04:27 np0005593103 certmonger[38997]: kC9GvfZ1O/3x//lWZTTWcePiJl/AT1YnS4UyMzi0jOztJwb5WrWjAvxlfmRK2/Be Jan 23 08:04:27 np0005593103 certmonger[38997]: OrUCAwEAAaOCAgAwggH8MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 08:04:27 np0005593103 certmonger[38997]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:27 np0005593103 certmonger[38997]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 08:04:27 np0005593103 certmonger[38997]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:27 np0005593103 certmonger[38997]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 08:04:27 np0005593103 certmonger[38997]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNoCs8nd Jan 23 08:04:27 np0005593103 certmonger[38997]: Nywhhkr1us4fQrZLjaQ8MIHZBgNVHREEgdEwgc6CHm5wMDAwNTU5MzEwMy5jdGxw Jan 23 08:04:27 np0005593103 certmonger[38997]: bGFuZS5vb28udGVzdIIbb3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisG Jan 23 08:04:27 np0005593103 certmonger[38997]: AQQBgjcUAgOgMQwvaGFwcm94eS9ucDAwMDU1OTMxMDMuY3RscGxhbmUub29vLnRl Jan 23 08:04:27 np0005593103 certmonger[38997]: c3RAT09PLlRFU1SgTgYGKwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaEr Jan 23 08:04:27 np0005593103 certmonger[38997]: MCkbB2hhcHJveHkbHm5wMDAwNTU5MzEwMy5jdGxwbGFuZS5vb28udGVzdDANBgkq Jan 23 08:04:27 np0005593103 certmonger[38997]: hkiG9w0BAQsFAAOCAYEAR1nds4GVFpRy96huHq3OcscxllMMtCZ3hnmqvcXgJ/D1 Jan 23 08:04:27 np0005593103 certmonger[38997]: OwIi+HVRneEmKls3Gz3A1K/bBiHI6D2IMEfOcG1o3hZlLVRjEKTj8uQHP/QOYZCn Jan 23 08:04:27 np0005593103 certmonger[38997]: lc5ZWRmmkPIYkkgjQou92nhvsXJQv5YSMGMycQ3Z+9GRyL35ED7dD3dEbKRrK6Bo Jan 23 08:04:27 np0005593103 certmonger[38997]: XAKb6+p+nDyNrT1jZWasunf+vuD66TAR3jK8SW847J9Zws0klN/XUItI9+V8CMnC Jan 23 08:04:27 np0005593103 certmonger[38997]: eJqj6D1RDY4y4w3kYai4Iy0ingh1NOHT6sm7bH3zzi9O4p7Jr4gZI7pqRmpWC5AX Jan 23 08:04:27 np0005593103 certmonger[38997]: 1fgIToxu80lFTuV5J0OmC2ZsKmPI5484HcD0sPeO8OmIPzF7FN9rHbs/XywW+1kR Jan 23 08:04:27 np0005593103 certmonger[38997]: S0ksIORyyXHzdAuX0rLAHkc4P8EwELyTpCYpD6ZIFgV0GBFThhi/bdkMig+fr/NX Jan 23 08:04:27 np0005593103 certmonger[38997]: vckzxOn7qg+B1oHA3piRM+xyZwgBX4e2oTgzW1uGlc8H/C17qdxEMgH83VSvX34v Jan 23 08:04:27 np0005593103 certmonger[38997]: O6rNUM0XO/DEq2zQ6rjD Jan 23 08:04:27 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:27 np0005593103 certmonger[38997]: " Jan 23 08:04:27 np0005593103 certmonger[41166]: 2026-01-23 08:04:27 [41166] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:27 np0005593103 certmonger[41166]: MIIFezCCA+OgAwIBAgIQdsoZHxzSa2/VjDv+3VYpRjANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:27 np0005593103 certmonger[41166]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:27 np0005593103 certmonger[41166]: aXR5MB4XDTI2MDEyMzA4MDQyN1oXDTI4MDEyNDA4MDQyN1owPDERMA8GA1UECgwI Jan 23 08:04:27 np0005593103 certmonger[41166]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMy5jdGxwbGFuZS5vb28udGVz Jan 23 08:04:27 np0005593103 certmonger[41166]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKmgk8PNPfG3BYM+j6Al Jan 23 08:04:27 np0005593103 certmonger[41166]: 8luhYDQOzvqZT5eHd7Q4OM2RYDI80w4SNXMpCXxM2JV/C4XBPPb6N0CtNYVMBrS1 Jan 23 08:04:27 np0005593103 certmonger[41166]: fA87VmOahOKBnXUAz6zDj4OzE3uUVP6eLbovr6fUX3WaInwkLvwi5gLNbKXbij5r Jan 23 08:04:27 np0005593103 certmonger[41166]: FO3a4zvWK3yRi+vajJDq3osxSf9U2qpNeT0+VDSgHQY/bpee6GLzAZE8y6uAzHit Jan 23 08:04:27 np0005593103 certmonger[41166]: wq+6Su4fdHaSAoySV1UiUiJWOdQM1xOnKNx4M6w/j5mGNgWy/5VjVqM/fjW/fHiw Jan 23 08:04:27 np0005593103 certmonger[41166]: kC9GvfZ1O/3x//lWZTTWcePiJl/AT1YnS4UyMzi0jOztJwb5WrWjAvxlfmRK2/Be Jan 23 08:04:27 np0005593103 certmonger[41166]: OrUCAwEAAaOCAgAwggH8MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 08:04:27 np0005593103 certmonger[41166]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:27 np0005593103 certmonger[41166]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 08:04:27 np0005593103 certmonger[41166]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:27 np0005593103 certmonger[41166]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 08:04:27 np0005593103 certmonger[41166]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNoCs8nd Jan 23 08:04:27 np0005593103 certmonger[41166]: Nywhhkr1us4fQrZLjaQ8MIHZBgNVHREEgdEwgc6CHm5wMDAwNTU5MzEwMy5jdGxw Jan 23 08:04:27 np0005593103 certmonger[41166]: bGFuZS5vb28udGVzdIIbb3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisG Jan 23 08:04:27 np0005593103 certmonger[41166]: AQQBgjcUAgOgMQwvaGFwcm94eS9ucDAwMDU1OTMxMDMuY3RscGxhbmUub29vLnRl Jan 23 08:04:27 np0005593103 certmonger[41166]: c3RAT09PLlRFU1SgTgYGKwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaEr Jan 23 08:04:27 np0005593103 certmonger[41166]: MCkbB2hhcHJveHkbHm5wMDAwNTU5MzEwMy5jdGxwbGFuZS5vb28udGVzdDANBgkq Jan 23 08:04:27 np0005593103 certmonger[41166]: hkiG9w0BAQsFAAOCAYEAR1nds4GVFpRy96huHq3OcscxllMMtCZ3hnmqvcXgJ/D1 Jan 23 08:04:27 np0005593103 certmonger[41166]: OwIi+HVRneEmKls3Gz3A1K/bBiHI6D2IMEfOcG1o3hZlLVRjEKTj8uQHP/QOYZCn Jan 23 08:04:27 np0005593103 certmonger[41166]: lc5ZWRmmkPIYkkgjQou92nhvsXJQv5YSMGMycQ3Z+9GRyL35ED7dD3dEbKRrK6Bo Jan 23 08:04:27 np0005593103 certmonger[41166]: XAKb6+p+nDyNrT1jZWasunf+vuD66TAR3jK8SW847J9Zws0klN/XUItI9+V8CMnC Jan 23 08:04:27 np0005593103 certmonger[41166]: eJqj6D1RDY4y4w3kYai4Iy0ingh1NOHT6sm7bH3zzi9O4p7Jr4gZI7pqRmpWC5AX Jan 23 08:04:27 np0005593103 certmonger[41166]: 1fgIToxu80lFTuV5J0OmC2ZsKmPI5484HcD0sPeO8OmIPzF7FN9rHbs/XywW+1kR Jan 23 08:04:27 np0005593103 certmonger[41166]: S0ksIORyyXHzdAuX0rLAHkc4P8EwELyTpCYpD6ZIFgV0GBFThhi/bdkMig+fr/NX Jan 23 08:04:27 np0005593103 certmonger[41166]: vckzxOn7qg+B1oHA3piRM+xyZwgBX4e2oTgzW1uGlc8H/C17qdxEMgH83VSvX34v Jan 23 08:04:27 np0005593103 certmonger[41166]: O6rNUM0XO/DEq2zQ6rjD Jan 23 08:04:27 np0005593103 certmonger[41166]: -----END CERTIFICATE----- Jan 23 08:04:27 np0005593103 certmonger[41166]: ". Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Certificate submission still ongoing. Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Certificate submission postprocessing complete. Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Child status = 0. Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Child output: Jan 23 08:04:27 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nO6rNUM0XO/DEq2zQ6rjD\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:27 np0005593103 certmonger[38997]: " Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:27 np0005593103 certmonger[38997]: MIIFezCCA+OgAwIBAgIQdsoZHxzSa2/VjDv+3VYpRjANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:27 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:27 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDQyN1oXDTI4MDEyNDA4MDQyN1owPDERMA8GA1UECgwI Jan 23 08:04:27 np0005593103 certmonger[38997]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMy5jdGxwbGFuZS5vb28udGVz Jan 23 08:04:27 np0005593103 certmonger[38997]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKmgk8PNPfG3BYM+j6Al Jan 23 08:04:27 np0005593103 certmonger[38997]: 8luhYDQOzvqZT5eHd7Q4OM2RYDI80w4SNXMpCXxM2JV/C4XBPPb6N0CtNYVMBrS1 Jan 23 08:04:27 np0005593103 certmonger[38997]: fA87VmOahOKBnXUAz6zDj4OzE3uUVP6eLbovr6fUX3WaInwkLvwi5gLNbKXbij5r Jan 23 08:04:27 np0005593103 certmonger[38997]: FO3a4zvWK3yRi+vajJDq3osxSf9U2qpNeT0+VDSgHQY/bpee6GLzAZE8y6uAzHit Jan 23 08:04:27 np0005593103 certmonger[38997]: wq+6Su4fdHaSAoySV1UiUiJWOdQM1xOnKNx4M6w/j5mGNgWy/5VjVqM/fjW/fHiw Jan 23 08:04:27 np0005593103 certmonger[38997]: kC9GvfZ1O/3x//lWZTTWcePiJl/AT1YnS4UyMzi0jOztJwb5WrWjAvxlfmRK2/Be Jan 23 08:04:27 np0005593103 certmonger[38997]: OrUCAwEAAaOCAgAwggH8MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 08:04:27 np0005593103 certmonger[38997]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:27 np0005593103 certmonger[38997]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 08:04:27 np0005593103 certmonger[38997]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 08:04:27 np0005593103 certmonger[38997]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 08:04:27 np0005593103 certmonger[38997]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNoCs8nd Jan 23 08:04:27 np0005593103 certmonger[38997]: Nywhhkr1us4fQrZLjaQ8MIHZBgNVHREEgdEwgc6CHm5wMDAwNTU5MzEwMy5jdGxw Jan 23 08:04:27 np0005593103 certmonger[38997]: bGFuZS5vb28udGVzdIIbb3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisG Jan 23 08:04:27 np0005593103 certmonger[38997]: AQQBgjcUAgOgMQwvaGFwcm94eS9ucDAwMDU1OTMxMDMuY3RscGxhbmUub29vLnRl Jan 23 08:04:27 np0005593103 certmonger[38997]: c3RAT09PLlRFU1SgTgYGKwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaEr Jan 23 08:04:27 np0005593103 certmonger[38997]: MCkbB2hhcHJveHkbHm5wMDAwNTU5MzEwMy5jdGxwbGFuZS5vb28udGVzdDANBgkq Jan 23 08:04:27 np0005593103 certmonger[38997]: hkiG9w0BAQsFAAOCAYEAR1nds4GVFpRy96huHq3OcscxllMMtCZ3hnmqvcXgJ/D1 Jan 23 08:04:27 np0005593103 certmonger[38997]: OwIi+HVRneEmKls3Gz3A1K/bBiHI6D2IMEfOcG1o3hZlLVRjEKTj8uQHP/QOYZCn Jan 23 08:04:27 np0005593103 certmonger[38997]: lc5ZWRmmkPIYkkgjQou92nhvsXJQv5YSMGMycQ3Z+9GRyL35ED7dD3dEbKRrK6Bo Jan 23 08:04:27 np0005593103 certmonger[38997]: XAKb6+p+nDyNrT1jZWasunf+vuD66TAR3jK8SW847J9Zws0klN/XUItI9+V8CMnC Jan 23 08:04:27 np0005593103 certmonger[38997]: eJqj6D1RDY4y4w3kYai4Iy0ingh1NOHT6sm7bH3zzi9O4p7Jr4gZI7pqRmpWC5AX Jan 23 08:04:27 np0005593103 certmonger[38997]: 1fgIToxu80lFTuV5J0OmC2ZsKmPI5484HcD0sPeO8OmIPzF7FN9rHbs/XywW+1kR Jan 23 08:04:27 np0005593103 certmonger[38997]: S0ksIORyyXHzdAuX0rLAHkc4P8EwELyTpCYpD6ZIFgV0GBFThhi/bdkMig+fr/NX Jan 23 08:04:27 np0005593103 certmonger[38997]: vckzxOn7qg+B1oHA3piRM+xyZwgBX4e2oTgzW1uGlc8H/C17qdxEMgH83VSvX34v Jan 23 08:04:27 np0005593103 certmonger[38997]: O6rNUM0XO/DEq2zQ6rjD Jan 23 08:04:27 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:27 np0005593103 certmonger[38997]: ". Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] No hooks set for pre-save command. Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:27 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:27 np0005593103 certmonger[41236]: Certificate in file "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" issued by CA and saved. Jan 23 08:04:27 np0005593103 certmonger[38997]: 2026-01-23 08:04:27 [38997] Wrote to /var/lib/certmonger/requests/20260123080426 Jan 23 08:04:28 np0005593103 python3[41252]: ansible-certificate_request Invoked with name=haproxy-storage-cert dns=['np0005593103.storage.ooo.test', 'overcloud.storage.ooo.test'] principal=['haproxy/np0005593103.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012cp "/etc/pki/tls/private/haproxy-storage-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:28 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.storage.ooo.test" for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.storage.ooo.test Jan 23 08:04:28 np0005593103 certmonger[41262]: overcloud.storage.ooo.test Jan 23 08:04:28 np0005593103 certmonger[41262]: " for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005593103.storage.ooo.test@OOO.TEST Jan 23 08:04:28 np0005593103 certmonger[41262]: " for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:28 np0005593103 certmonger[41262]: MIID5DCCAswCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29v Jan 23 08:04:28 np0005593103 certmonger[41262]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9ovJD5jQn+qqS Jan 23 08:04:28 np0005593103 certmonger[41262]: hG7W99o5nX7KB3Yz52PD6oNrmak+ee7YERhmrxuccjNLOBZHgWOOkdfvUzf9k4Qy Jan 23 08:04:28 np0005593103 certmonger[41262]: pLwVQ4If+gWvu0q6BXyMbpxTUEAR3H9UH9otXnRkMvyPqSxmzwbKUcgIL1YA/9Ca Jan 23 08:04:28 np0005593103 certmonger[41262]: HBu8w/KUus2LQbAzgPXH2eC67EnvWixthYcWoIik5eGuS63n6xphajdFBEux87u6 Jan 23 08:04:28 np0005593103 certmonger[41262]: ZJ0PdiuCX517efKYdCzQ36Vx0aSrqrixk9SqZeH3EhAJeXQXVyRBS54jac4XWIvx Jan 23 08:04:28 np0005593103 certmonger[41262]: oqrtHeVkRTDbiROGAoxgAZqdm9m1pVH/dvkV6Z9fWV0sQbC8Qx2dt62aAfuPs4NT Jan 23 08:04:28 np0005593103 certmonger[41262]: zkQHhuDtAgMBAAGgggF1MCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANgAwADEAMgAz Jan 23 08:04:28 np0005593103 certmonger[41262]: ADAAOAAwADQAMgA4MIIBRAYJKoZIhvcNAQkOMYIBNTCCATEwCwYDVR0PBAQDAgWg Jan 23 08:04:28 np0005593103 certmonger[41262]: MIHVBgNVHREEgc0wgcqCHW5wMDAwNTU5MzEwMy5zdG9yYWdlLm9vby50ZXN0ghpv Jan 23 08:04:28 np0005593103 certmonger[41262]: dmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEEAYI3FAIDoDAMLmhhcHJv Jan 23 08:04:28 np0005593103 certmonger[41262]: eHkvbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29vLnRlc3RAT09PLlRFU1SgTQYGKwYB Jan 23 08:04:28 np0005593103 certmonger[41262]: BQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgbB2hhcHJveHkbHW5wMDAw Jan 23 08:04:28 np0005593103 certmonger[41262]: NTU5MzEwMy5zdG9yYWdlLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr Jan 23 08:04:28 np0005593103 certmonger[41262]: BgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQoGXl102iienNkmU7558Ja Jan 23 08:04:28 np0005593103 certmonger[41262]: dxksCDANBgkqhkiG9w0BAQsFAAOCAQEAHCT7EZ7p9G+PDuBaP+ar1bK8OHWyVHdz Jan 23 08:04:28 np0005593103 certmonger[41262]: meZQ7DrUn6oq46GzxmVqw7Y+BW9x+lYwNFeH7KLqgSN79uhaS44VR+xh12x90bHr Jan 23 08:04:28 np0005593103 certmonger[41262]: 2QEcVo56ZdUpiwpVGxPdqf0qsWaBFsSdtUmxpD0PkIWKtoR4UOCI2QIK7uwYo2PX Jan 23 08:04:28 np0005593103 certmonger[41262]: 27eVMLmiNC4SZB+gQnyshPdOBHblqgy5R/qbU5Lm/SQWfZnvQF9x0mHkarpWasrz Jan 23 08:04:28 np0005593103 certmonger[41262]: ZSaLwS0u/0axZnaLxw6HK5BhI64mWEi5Oed12z9krOZkOaxu3T34ngDnhM96+jBm Jan 23 08:04:28 np0005593103 certmonger[41262]: xjj2npZi+SESsPYkswjQbNcB773RuSPEa1rPxYehqdqrFif3MDZrSw== Jan 23 08:04:28 np0005593103 certmonger[41262]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:28 np0005593103 certmonger[41262]: " for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvaLyQ+Y0J/qqkoRu1vfaOZ1+ygd2M+djw+qDa5mpPnnu2BEYZq8bnHIzSzgWR4FjjpHX71M3/ZOEMqS8FUOCH/oFr7tKugV8jG6cU1BAEdx/VB/aLV50ZDL8j6ksZs8GylHICC9WAP/QmhwbvMPylLrNi0GwM4D1x9nguuxJ71osbYWHFqCIpOXhrkut5+saYWo3RQRLsfO7umSdD3Yrgl+de3nymHQs0N+lcdGkq6q4sZPUqmXh9xIQCXl0F1ckQUueI2nOF1iL8aKq7R3lZEUw24kThgKMYAGanZvZtaVR/3b5FemfX1ldLEGwvEMdnbetmgH7j7ODU85EB4bg7QIDAQAB" for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:28 np0005593103 certmonger[41262]: 2026-01-23 08:04:28 [41262] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:28 np0005593103 certmonger[38997]: 2026-01-23 08:04:28 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:28 np0005593103 certmonger[41262]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:29 np0005593103 certmonger[41262]: Certificate: "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" Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Certificate submission still ongoing. Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Certificate submission attempt complete. Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Child status = 0. Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Child output: Jan 23 08:04:29 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:29 np0005593103 certmonger[38997]: MIIFdjCCA96gAwIBAgIQe3kZNlhPodB+Gpl7tNA/7jANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:29 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:29 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDQyOVoXDTI4MDEyNDA4MDQyOVowOzERMA8GA1UECgwI Jan 23 08:04:29 np0005593103 certmonger[38997]: T09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTU5MzEwMy5zdG9yYWdlLm9vby50ZXN0 Jan 23 08:04:29 np0005593103 certmonger[38997]: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvaLyQ+Y0J/qqkoRu1vfa Jan 23 08:04:29 np0005593103 certmonger[38997]: OZ1+ygd2M+djw+qDa5mpPnnu2BEYZq8bnHIzSzgWR4FjjpHX71M3/ZOEMqS8FUOC Jan 23 08:04:29 np0005593103 certmonger[38997]: H/oFr7tKugV8jG6cU1BAEdx/VB/aLV50ZDL8j6ksZs8GylHICC9WAP/QmhwbvMPy Jan 23 08:04:29 np0005593103 certmonger[38997]: lLrNi0GwM4D1x9nguuxJ71osbYWHFqCIpOXhrkut5+saYWo3RQRLsfO7umSdD3Yr Jan 23 08:04:29 np0005593103 certmonger[38997]: gl+de3nymHQs0N+lcdGkq6q4sZPUqmXh9xIQCXl0F1ckQUueI2nOF1iL8aKq7R3l Jan 23 08:04:29 np0005593103 certmonger[38997]: ZEUw24kThgKMYAGanZvZtaVR/3b5FemfX1ldLEGwvEMdnbetmgH7j7ODU85EB4bg Jan 23 08:04:29 np0005593103 certmonger[38997]: 7QIDAQABo4IB/DCCAfgwHwYDVR0jBBgwFoAU9rnfT/lUfXM9lKGS0+tarXcs8jgw Jan 23 08:04:29 np0005593103 certmonger[38997]: OgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50 Jan 23 08:04:29 np0005593103 certmonger[38997]: ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB Jan 23 08:04:29 np0005593103 certmonger[38997]: BggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50 Jan 23 08:04:29 np0005593103 certmonger[38997]: ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex Jan 23 08:04:29 np0005593103 certmonger[38997]: HjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU4flrXNnH Jan 23 08:04:29 np0005593103 certmonger[38997]: R6jMfn8d85yqwU1ZAL4wgdUGA1UdEQSBzTCByoIdbnAwMDA1NTkzMTAzLnN0b3Jh Jan 23 08:04:29 np0005593103 certmonger[38997]: Z2Uub29vLnRlc3SCGm92ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQB Jan 23 08:04:29 np0005593103 certmonger[38997]: gjcUAgOgMAwuaGFwcm94eS9ucDAwMDU1OTMxMDMuc3RvcmFnZS5vb28udGVzdEBP Jan 23 08:04:29 np0005593103 certmonger[38997]: T08uVEVTVKBNBgYrBgEFAgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsH Jan 23 08:04:29 np0005593103 certmonger[38997]: aGFwcm94eRsdbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcN Jan 23 08:04:29 np0005593103 certmonger[38997]: AQELBQADggGBANTR9pc6e31xF7U3IZt4uW0/RGQbmKPCLV4ANAQrDxqoXu4WC3oG Jan 23 08:04:29 np0005593103 certmonger[38997]: Tk3dMLz5MlVEqNFH8/wgLvp7c6lql/3M1JeutqkdOsEM+5Iqx/va0YSVZt1Qq408 Jan 23 08:04:29 np0005593103 certmonger[38997]: dT+aZyIxyxjKxraY3iedsHX+euw41vEdmIENX5tdQPlnTVstcjR/i1Gq67ONc55N Jan 23 08:04:29 np0005593103 certmonger[38997]: kgX9V88Q+AgqxpTrlasUrbpwrKErM7tSu59E0ghL4ldc9mv9A5DcOiRv5lbowtBZ Jan 23 08:04:29 np0005593103 certmonger[38997]: cDi+UQm8cjZoNg33GJ5A1JdKORf7093kbrRiJc7Xo4dPdEtFFj5exiLN1ZLFEKht Jan 23 08:04:29 np0005593103 certmonger[38997]: MN7ntfKSW9dTCf6vcd9y2dMqxUtMnDtELaZlCXAkFNfvuZ29Yyiihb7djTTJ6oX6 Jan 23 08:04:29 np0005593103 certmonger[38997]: HkaFyRXFFVlRhdpLEcHYsAtriodh58b3ZYBrslGHN+QON/u4lMjNJnlQmPhN8h+K Jan 23 08:04:29 np0005593103 certmonger[38997]: 2dzl0TLJiGKxsFaXtsEsHyOPODCSkY6AZR1mQx0D4g/7FvldcDsBo52+LtEVOdEk Jan 23 08:04:29 np0005593103 certmonger[38997]: MThDy/VHqrOMaA== Jan 23 08:04:29 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:29 np0005593103 certmonger[38997]: " Jan 23 08:04:29 np0005593103 certmonger[41264]: 2026-01-23 08:04:29 [41264] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:29 np0005593103 certmonger[41264]: MIIFdjCCA96gAwIBAgIQe3kZNlhPodB+Gpl7tNA/7jANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:29 np0005593103 certmonger[41264]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:29 np0005593103 certmonger[41264]: aXR5MB4XDTI2MDEyMzA4MDQyOVoXDTI4MDEyNDA4MDQyOVowOzERMA8GA1UECgwI Jan 23 08:04:29 np0005593103 certmonger[41264]: T09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTU5MzEwMy5zdG9yYWdlLm9vby50ZXN0 Jan 23 08:04:29 np0005593103 certmonger[41264]: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvaLyQ+Y0J/qqkoRu1vfa Jan 23 08:04:29 np0005593103 certmonger[41264]: OZ1+ygd2M+djw+qDa5mpPnnu2BEYZq8bnHIzSzgWR4FjjpHX71M3/ZOEMqS8FUOC Jan 23 08:04:29 np0005593103 certmonger[41264]: H/oFr7tKugV8jG6cU1BAEdx/VB/aLV50ZDL8j6ksZs8GylHICC9WAP/QmhwbvMPy Jan 23 08:04:29 np0005593103 certmonger[41264]: lLrNi0GwM4D1x9nguuxJ71osbYWHFqCIpOXhrkut5+saYWo3RQRLsfO7umSdD3Yr Jan 23 08:04:29 np0005593103 certmonger[41264]: gl+de3nymHQs0N+lcdGkq6q4sZPUqmXh9xIQCXl0F1ckQUueI2nOF1iL8aKq7R3l Jan 23 08:04:29 np0005593103 certmonger[41264]: ZEUw24kThgKMYAGanZvZtaVR/3b5FemfX1ldLEGwvEMdnbetmgH7j7ODU85EB4bg Jan 23 08:04:29 np0005593103 certmonger[41264]: 7QIDAQABo4IB/DCCAfgwHwYDVR0jBBgwFoAU9rnfT/lUfXM9lKGS0+tarXcs8jgw Jan 23 08:04:29 np0005593103 certmonger[41264]: OgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50 Jan 23 08:04:29 np0005593103 certmonger[41264]: ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB Jan 23 08:04:29 np0005593103 certmonger[41264]: BggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50 Jan 23 08:04:29 np0005593103 certmonger[41264]: ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex Jan 23 08:04:29 np0005593103 certmonger[41264]: HjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU4flrXNnH Jan 23 08:04:29 np0005593103 certmonger[41264]: R6jMfn8d85yqwU1ZAL4wgdUGA1UdEQSBzTCByoIdbnAwMDA1NTkzMTAzLnN0b3Jh Jan 23 08:04:29 np0005593103 certmonger[41264]: Z2Uub29vLnRlc3SCGm92ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQB Jan 23 08:04:29 np0005593103 certmonger[41264]: gjcUAgOgMAwuaGFwcm94eS9ucDAwMDU1OTMxMDMuc3RvcmFnZS5vb28udGVzdEBP Jan 23 08:04:29 np0005593103 certmonger[41264]: T08uVEVTVKBNBgYrBgEFAgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsH Jan 23 08:04:29 np0005593103 certmonger[41264]: aGFwcm94eRsdbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcN Jan 23 08:04:29 np0005593103 certmonger[41264]: AQELBQADggGBANTR9pc6e31xF7U3IZt4uW0/RGQbmKPCLV4ANAQrDxqoXu4WC3oG Jan 23 08:04:29 np0005593103 certmonger[41264]: Tk3dMLz5MlVEqNFH8/wgLvp7c6lql/3M1JeutqkdOsEM+5Iqx/va0YSVZt1Qq408 Jan 23 08:04:29 np0005593103 certmonger[41264]: dT+aZyIxyxjKxraY3iedsHX+euw41vEdmIENX5tdQPlnTVstcjR/i1Gq67ONc55N Jan 23 08:04:29 np0005593103 certmonger[41264]: kgX9V88Q+AgqxpTrlasUrbpwrKErM7tSu59E0ghL4ldc9mv9A5DcOiRv5lbowtBZ Jan 23 08:04:29 np0005593103 certmonger[41264]: cDi+UQm8cjZoNg33GJ5A1JdKORf7093kbrRiJc7Xo4dPdEtFFj5exiLN1ZLFEKht Jan 23 08:04:29 np0005593103 certmonger[41264]: MN7ntfKSW9dTCf6vcd9y2dMqxUtMnDtELaZlCXAkFNfvuZ29Yyiihb7djTTJ6oX6 Jan 23 08:04:29 np0005593103 certmonger[41264]: HkaFyRXFFVlRhdpLEcHYsAtriodh58b3ZYBrslGHN+QON/u4lMjNJnlQmPhN8h+K Jan 23 08:04:29 np0005593103 certmonger[41264]: 2dzl0TLJiGKxsFaXtsEsHyOPODCSkY6AZR1mQx0D4g/7FvldcDsBo52+LtEVOdEk Jan 23 08:04:29 np0005593103 certmonger[41264]: MThDy/VHqrOMaA== Jan 23 08:04:29 np0005593103 certmonger[41264]: -----END CERTIFICATE----- Jan 23 08:04:29 np0005593103 certmonger[41264]: ". Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Certificate submission still ongoing. Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Certificate submission postprocessing complete. Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Child status = 0. Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Child output: Jan 23 08:04:29 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nMThDy/VHqrOMaA==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:29 np0005593103 certmonger[38997]: " Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:29 np0005593103 certmonger[38997]: MIIFdjCCA96gAwIBAgIQe3kZNlhPodB+Gpl7tNA/7jANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:29 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:29 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDQyOVoXDTI4MDEyNDA4MDQyOVowOzERMA8GA1UECgwI Jan 23 08:04:29 np0005593103 certmonger[38997]: T09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTU5MzEwMy5zdG9yYWdlLm9vby50ZXN0 Jan 23 08:04:29 np0005593103 certmonger[38997]: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvaLyQ+Y0J/qqkoRu1vfa Jan 23 08:04:29 np0005593103 certmonger[38997]: OZ1+ygd2M+djw+qDa5mpPnnu2BEYZq8bnHIzSzgWR4FjjpHX71M3/ZOEMqS8FUOC Jan 23 08:04:29 np0005593103 certmonger[38997]: H/oFr7tKugV8jG6cU1BAEdx/VB/aLV50ZDL8j6ksZs8GylHICC9WAP/QmhwbvMPy Jan 23 08:04:29 np0005593103 certmonger[38997]: lLrNi0GwM4D1x9nguuxJ71osbYWHFqCIpOXhrkut5+saYWo3RQRLsfO7umSdD3Yr Jan 23 08:04:29 np0005593103 certmonger[38997]: gl+de3nymHQs0N+lcdGkq6q4sZPUqmXh9xIQCXl0F1ckQUueI2nOF1iL8aKq7R3l Jan 23 08:04:29 np0005593103 certmonger[38997]: ZEUw24kThgKMYAGanZvZtaVR/3b5FemfX1ldLEGwvEMdnbetmgH7j7ODU85EB4bg Jan 23 08:04:29 np0005593103 certmonger[38997]: 7QIDAQABo4IB/DCCAfgwHwYDVR0jBBgwFoAU9rnfT/lUfXM9lKGS0+tarXcs8jgw Jan 23 08:04:29 np0005593103 certmonger[38997]: OgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50 Jan 23 08:04:29 np0005593103 certmonger[38997]: ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMB Jan 23 08:04:29 np0005593103 certmonger[38997]: BggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50 Jan 23 08:04:29 np0005593103 certmonger[38997]: ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2Ex Jan 23 08:04:29 np0005593103 certmonger[38997]: HjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU4flrXNnH Jan 23 08:04:29 np0005593103 certmonger[38997]: R6jMfn8d85yqwU1ZAL4wgdUGA1UdEQSBzTCByoIdbnAwMDA1NTkzMTAzLnN0b3Jh Jan 23 08:04:29 np0005593103 certmonger[38997]: Z2Uub29vLnRlc3SCGm92ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQB Jan 23 08:04:29 np0005593103 certmonger[38997]: gjcUAgOgMAwuaGFwcm94eS9ucDAwMDU1OTMxMDMuc3RvcmFnZS5vb28udGVzdEBP Jan 23 08:04:29 np0005593103 certmonger[38997]: T08uVEVTVKBNBgYrBgEFAgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsH Jan 23 08:04:29 np0005593103 certmonger[38997]: aGFwcm94eRsdbnAwMDA1NTkzMTAzLnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcN Jan 23 08:04:29 np0005593103 certmonger[38997]: AQELBQADggGBANTR9pc6e31xF7U3IZt4uW0/RGQbmKPCLV4ANAQrDxqoXu4WC3oG Jan 23 08:04:29 np0005593103 certmonger[38997]: Tk3dMLz5MlVEqNFH8/wgLvp7c6lql/3M1JeutqkdOsEM+5Iqx/va0YSVZt1Qq408 Jan 23 08:04:29 np0005593103 certmonger[38997]: dT+aZyIxyxjKxraY3iedsHX+euw41vEdmIENX5tdQPlnTVstcjR/i1Gq67ONc55N Jan 23 08:04:29 np0005593103 certmonger[38997]: kgX9V88Q+AgqxpTrlasUrbpwrKErM7tSu59E0ghL4ldc9mv9A5DcOiRv5lbowtBZ Jan 23 08:04:29 np0005593103 certmonger[38997]: cDi+UQm8cjZoNg33GJ5A1JdKORf7093kbrRiJc7Xo4dPdEtFFj5exiLN1ZLFEKht Jan 23 08:04:29 np0005593103 certmonger[38997]: MN7ntfKSW9dTCf6vcd9y2dMqxUtMnDtELaZlCXAkFNfvuZ29Yyiihb7djTTJ6oX6 Jan 23 08:04:29 np0005593103 certmonger[38997]: HkaFyRXFFVlRhdpLEcHYsAtriodh58b3ZYBrslGHN+QON/u4lMjNJnlQmPhN8h+K Jan 23 08:04:29 np0005593103 certmonger[38997]: 2dzl0TLJiGKxsFaXtsEsHyOPODCSkY6AZR1mQx0D4g/7FvldcDsBo52+LtEVOdEk Jan 23 08:04:29 np0005593103 certmonger[38997]: MThDy/VHqrOMaA== Jan 23 08:04:29 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:29 np0005593103 certmonger[38997]: ". Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] No hooks set for pre-save command. Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:29 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:29 np0005593103 certmonger[41335]: Certificate in file "/etc/pki/tls/certs/haproxy-storage-cert.crt" issued by CA and saved. Jan 23 08:04:29 np0005593103 certmonger[38997]: 2026-01-23 08:04:29 [38997] Wrote to /var/lib/certmonger/requests/20260123080428 Jan 23 08:04:30 np0005593103 python3[41351]: ansible-certificate_request Invoked with name=haproxy-storage_mgmt-cert dns=['np0005593103.storagemgmt.ooo.test', 'overcloud.storagemgmt.ooo.test'] principal=['haproxy/np0005593103.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012cp "/etc/pki/tls/private/haproxy-storage_mgmt-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:30 np0005593103 certmonger[38997]: 2026-01-23 08:04:30 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:30 np0005593103 certmonger[38997]: 2026-01-23 08:04:30 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:30 np0005593103 certmonger[38997]: 2026-01-23 08:04:30 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:30 np0005593103 certmonger[38997]: 2026-01-23 08:04:30 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:30 np0005593103 certmonger[38997]: 2026-01-23 08:04:30 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:30 np0005593103 certmonger[38997]: 2026-01-23 08:04:30 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:30 np0005593103 certmonger[38997]: 2026-01-23 08:04:30 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:30 np0005593103 certmonger[38997]: 2026-01-23 08:04:30 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:30 np0005593103 certmonger[38997]: 2026-01-23 08:04:30 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:30 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.storagemgmt.ooo.test" for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.storagemgmt.ooo.test Jan 23 08:04:31 np0005593103 certmonger[41361]: overcloud.storagemgmt.ooo.test Jan 23 08:04:31 np0005593103 certmonger[41361]: " for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005593103.storagemgmt.ooo.test@OOO.TEST Jan 23 08:04:31 np0005593103 certmonger[41361]: " for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:31 np0005593103 certmonger[41361]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLnN0b3JhZ2VtZ210 Jan 23 08:04:31 np0005593103 certmonger[41361]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwOYEhDEo Jan 23 08:04:31 np0005593103 certmonger[41361]: CSZuRQWXSGWYs1iqAwhtQXUxlYqkNManLDnThk7u8vTngtQU6SWQtwsIyID0kHJR Jan 23 08:04:31 np0005593103 certmonger[41361]: k10qyTFH2baa5JiAI3rfpg+iDodR3HekwKxIj54y6ZKmxSCmsXZnVBft13csfH9o Jan 23 08:04:31 np0005593103 certmonger[41361]: s6DZQWVK1fFTw02KJst29MppUk12PM/e6zYPGB5w3bsPDgg71AMsd4j+vwSCVLIL Jan 23 08:04:31 np0005593103 certmonger[41361]: orbnmRvDSvQc58OI4VA7Ih15xJL5tSHsorACvs3uw/pcbwjZvtowfY2aZZar5GB5 Jan 23 08:04:31 np0005593103 certmonger[41361]: V73hhJ4x0IcWFQktw5g36ASEtzPeDk6pxdmlHkH/veKFOqvQ2Jkq35OKSueJRqZ6 Jan 23 08:04:31 np0005593103 certmonger[41361]: Ei4Mu3QGDMqngwIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:04:31 np0005593103 certmonger[41361]: ADIAMwAwADgAMAA0ADMAMDCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Jan 23 08:04:31 np0005593103 certmonger[41361]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDMuc3RvcmFnZW1nbXQub29v Jan 23 08:04:31 np0005593103 certmonger[41361]: LnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28udGVzdKBCBgorBgEEAYI3 Jan 23 08:04:31 np0005593103 certmonger[41361]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAzLnN0b3JhZ2VtZ210Lm9vby50ZXN0 Jan 23 08:04:31 np0005593103 certmonger[41361]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Jan 23 08:04:31 np0005593103 certmonger[41361]: GwdoYXByb3h5GyFucDAwMDU1OTMxMDMuc3RvcmFnZW1nbXQub29vLnRlc3QwHQYD Jan 23 08:04:31 np0005593103 certmonger[41361]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Jan 23 08:04:31 np0005593103 certmonger[41361]: BBYEFKbL6fBcyWaCNuPSVTpMo2J/gxfOMA0GCSqGSIb3DQEBCwUAA4IBAQBiJZHy Jan 23 08:04:31 np0005593103 certmonger[41361]: XeoE4BQlmYz/mzPB6nX1KrxsIwsaxp4sWTSSTSdkQfQqFm0XoNLMHN4F3aytIs5i Jan 23 08:04:31 np0005593103 certmonger[41361]: rhOU6oMLG0LGrZb0ZdEMWoRYMeCdmgVMY8+BprzBnY4SsvStUsvym8uc3P9Pcjy2 Jan 23 08:04:31 np0005593103 certmonger[41361]: mb60QKzJhyyEBsbL956C1FOXBXwRwA5bg8vIAmqWTuFbtaK8oR1RUoEdPf0q7OH6 Jan 23 08:04:31 np0005593103 certmonger[41361]: yMVR0gKoV+sMAAJRMr3QUwt0WPUbb51pIp262jalRvTcgrIMdBgjNyc/Ec19181o Jan 23 08:04:31 np0005593103 certmonger[41361]: +6I7/9NWG0F79NL+oUkGSzwWIeexVZ6zJzXAl1vh4Xa71TWjvvPjKjN2U2yMF1V+ Jan 23 08:04:31 np0005593103 certmonger[41361]: dILjr9Nl74fggwso Jan 23 08:04:31 np0005593103 certmonger[41361]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:31 np0005593103 certmonger[41361]: " for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwOYEhDEoCSZuRQWXSGWYs1iqAwhtQXUxlYqkNManLDnThk7u8vTngtQU6SWQtwsIyID0kHJRk10qyTFH2baa5JiAI3rfpg+iDodR3HekwKxIj54y6ZKmxSCmsXZnVBft13csfH9os6DZQWVK1fFTw02KJst29MppUk12PM/e6zYPGB5w3bsPDgg71AMsd4j+vwSCVLILorbnmRvDSvQc58OI4VA7Ih15xJL5tSHsorACvs3uw/pcbwjZvtowfY2aZZar5GB5V73hhJ4x0IcWFQktw5g36ASEtzPeDk6pxdmlHkH/veKFOqvQ2Jkq35OKSueJRqZ6Ei4Mu3QGDMqngwIDAQAB" for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:31 np0005593103 certmonger[41361]: 2026-01-23 08:04:31 [41361] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[41361]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:31 np0005593103 certmonger[41361]: Certificate: "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" Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Certificate submission still ongoing. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Certificate submission attempt complete. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Child status = 0. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Child output: Jan 23 08:04:31 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:31 np0005593103 certmonger[38997]: MIIFijCCA/KgAwIBAgIQW7R8sNrD/5+bMttiat8JCDANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:31 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:31 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDQzMVoXDTI4MDEyNDA4MDQzMVowPzERMA8GA1UECgwI Jan 23 08:04:31 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdtdC5vb28u Jan 23 08:04:31 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMDmBIQxKAkmbkUF Jan 23 08:04:31 np0005593103 certmonger[38997]: l0hlmLNYqgMIbUF1MZWKpDTGpyw504ZO7vL054LUFOklkLcLCMiA9JByUZNdKskx Jan 23 08:04:31 np0005593103 certmonger[38997]: R9m2muSYgCN636YPog6HUdx3pMCsSI+eMumSpsUgprF2Z1QX7dd3LHx/aLOg2UFl Jan 23 08:04:31 np0005593103 certmonger[38997]: StXxU8NNiibLdvTKaVJNdjzP3us2DxgecN27Dw4IO9QDLHeI/r8EglSyC6K255kb Jan 23 08:04:31 np0005593103 certmonger[38997]: w0r0HOfDiOFQOyIdecSS+bUh7KKwAr7N7sP6XG8I2b7aMH2NmmWWq+RgeVe94YSe Jan 23 08:04:31 np0005593103 certmonger[38997]: MdCHFhUJLcOYN+gEhLcz3g5OqcXZpR5B/73ihTqr0NiZKt+TikrniUamehIuDLt0 Jan 23 08:04:31 np0005593103 certmonger[38997]: BgzKp4MCAwEAAaOCAgwwggIIMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:04:31 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:04:31 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:04:31 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:04:31 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:04:31 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCz1 Jan 23 08:04:31 np0005593103 certmonger[38997]: hN2hFccXjiHagN5OnWt0FhPDMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU5MzEwMy5z Jan 23 08:04:31 np0005593103 certmonger[38997]: dG9yYWdlbWdtdC5vb28udGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50 Jan 23 08:04:31 np0005593103 certmonger[38997]: ZXN0oEIGCisGAQQBgjcUAgOgNAwyaGFwcm94eS9ucDAwMDU1OTMxMDMuc3RvcmFn Jan 23 08:04:31 np0005593103 certmonger[38997]: ZW1nbXQub29vLnRlc3RAT09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVT Jan 23 08:04:31 np0005593103 certmonger[38997]: VKE3MDWgAwIBAaEuMCwbB2hhcHJveHkbIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdt Jan 23 08:04:31 np0005593103 certmonger[38997]: dC5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAPdUCk91F9hL/rlFkQ2TtMIKx Jan 23 08:04:31 np0005593103 certmonger[38997]: KscPIDcMfG22LMwjTDoAj1B8KdxdWkSr3k/VYSTFl113tt2xpjNQXQFSgZ92lLlu Jan 23 08:04:31 np0005593103 certmonger[38997]: 5kJ0q49otUHmO6xmXQR5hpGkuYZklBa6pS3iG4hNbxFUwqV6o+a+zo+Qck1oFHZd Jan 23 08:04:31 np0005593103 certmonger[38997]: bTysH031nRPJvB/yJgHCf9VN/k+FEH8pi/6XGBmdQmfvmjffFCUSmAIDNuTdNPI+ Jan 23 08:04:31 np0005593103 certmonger[38997]: xYuHOYDPLKsIe3RRBeUA37LQM8KXDQgujOf7UFatpUMUxmjp0HLf6qht85ijhLmn Jan 23 08:04:31 np0005593103 certmonger[38997]: D/9eIqP7XVZwaWpR30nWZS1EupC75+fn6M2zToBaqd2U926SjZufQQ3VsZ865u+N Jan 23 08:04:31 np0005593103 certmonger[38997]: rBA4WQsNrAAG0dum7vVDfH3vJYnQ4XJ9QJBxajH9mPc275DsjqboVfu+rUn6uNfg Jan 23 08:04:31 np0005593103 certmonger[38997]: UAQgPpnhqdKLOWoV3K5/DRIt05PH0mGRlKGNoVJVcra/yHCTXkNJNiMW8RUJzQnm Jan 23 08:04:31 np0005593103 certmonger[38997]: bSrZKsXmVErHpHJ45c9Yep3lcfDBU1/WFFonn8nV Jan 23 08:04:31 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:31 np0005593103 certmonger[38997]: " Jan 23 08:04:31 np0005593103 certmonger[41363]: 2026-01-23 08:04:31 [41363] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:31 np0005593103 certmonger[41363]: MIIFijCCA/KgAwIBAgIQW7R8sNrD/5+bMttiat8JCDANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:31 np0005593103 certmonger[41363]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:31 np0005593103 certmonger[41363]: aXR5MB4XDTI2MDEyMzA4MDQzMVoXDTI4MDEyNDA4MDQzMVowPzERMA8GA1UECgwI Jan 23 08:04:31 np0005593103 certmonger[41363]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdtdC5vb28u Jan 23 08:04:31 np0005593103 certmonger[41363]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMDmBIQxKAkmbkUF Jan 23 08:04:31 np0005593103 certmonger[41363]: l0hlmLNYqgMIbUF1MZWKpDTGpyw504ZO7vL054LUFOklkLcLCMiA9JByUZNdKskx Jan 23 08:04:31 np0005593103 certmonger[41363]: R9m2muSYgCN636YPog6HUdx3pMCsSI+eMumSpsUgprF2Z1QX7dd3LHx/aLOg2UFl Jan 23 08:04:31 np0005593103 certmonger[41363]: StXxU8NNiibLdvTKaVJNdjzP3us2DxgecN27Dw4IO9QDLHeI/r8EglSyC6K255kb Jan 23 08:04:31 np0005593103 certmonger[41363]: w0r0HOfDiOFQOyIdecSS+bUh7KKwAr7N7sP6XG8I2b7aMH2NmmWWq+RgeVe94YSe Jan 23 08:04:31 np0005593103 certmonger[41363]: MdCHFhUJLcOYN+gEhLcz3g5OqcXZpR5B/73ihTqr0NiZKt+TikrniUamehIuDLt0 Jan 23 08:04:31 np0005593103 certmonger[41363]: BgzKp4MCAwEAAaOCAgwwggIIMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:04:31 np0005593103 certmonger[41363]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:04:31 np0005593103 certmonger[41363]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:04:31 np0005593103 certmonger[41363]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:04:31 np0005593103 certmonger[41363]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:04:31 np0005593103 certmonger[41363]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCz1 Jan 23 08:04:31 np0005593103 certmonger[41363]: hN2hFccXjiHagN5OnWt0FhPDMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU5MzEwMy5z Jan 23 08:04:31 np0005593103 certmonger[41363]: dG9yYWdlbWdtdC5vb28udGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50 Jan 23 08:04:31 np0005593103 certmonger[41363]: ZXN0oEIGCisGAQQBgjcUAgOgNAwyaGFwcm94eS9ucDAwMDU1OTMxMDMuc3RvcmFn Jan 23 08:04:31 np0005593103 certmonger[41363]: ZW1nbXQub29vLnRlc3RAT09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVT Jan 23 08:04:31 np0005593103 certmonger[41363]: VKE3MDWgAwIBAaEuMCwbB2hhcHJveHkbIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdt Jan 23 08:04:31 np0005593103 certmonger[41363]: dC5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAPdUCk91F9hL/rlFkQ2TtMIKx Jan 23 08:04:31 np0005593103 certmonger[41363]: KscPIDcMfG22LMwjTDoAj1B8KdxdWkSr3k/VYSTFl113tt2xpjNQXQFSgZ92lLlu Jan 23 08:04:31 np0005593103 certmonger[41363]: 5kJ0q49otUHmO6xmXQR5hpGkuYZklBa6pS3iG4hNbxFUwqV6o+a+zo+Qck1oFHZd Jan 23 08:04:31 np0005593103 certmonger[41363]: bTysH031nRPJvB/yJgHCf9VN/k+FEH8pi/6XGBmdQmfvmjffFCUSmAIDNuTdNPI+ Jan 23 08:04:31 np0005593103 certmonger[41363]: xYuHOYDPLKsIe3RRBeUA37LQM8KXDQgujOf7UFatpUMUxmjp0HLf6qht85ijhLmn Jan 23 08:04:31 np0005593103 certmonger[41363]: D/9eIqP7XVZwaWpR30nWZS1EupC75+fn6M2zToBaqd2U926SjZufQQ3VsZ865u+N Jan 23 08:04:31 np0005593103 certmonger[41363]: rBA4WQsNrAAG0dum7vVDfH3vJYnQ4XJ9QJBxajH9mPc275DsjqboVfu+rUn6uNfg Jan 23 08:04:31 np0005593103 certmonger[41363]: UAQgPpnhqdKLOWoV3K5/DRIt05PH0mGRlKGNoVJVcra/yHCTXkNJNiMW8RUJzQnm Jan 23 08:04:31 np0005593103 certmonger[41363]: bSrZKsXmVErHpHJ45c9Yep3lcfDBU1/WFFonn8nV Jan 23 08:04:31 np0005593103 certmonger[41363]: -----END CERTIFICATE----- Jan 23 08:04:31 np0005593103 certmonger[41363]: ". Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Certificate submission still ongoing. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Certificate submission postprocessing complete. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Child status = 0. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Child output: Jan 23 08:04:31 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nbSrZKsXmVErHpHJ45c9Yep3lcfDBU1/WFFonn8nV\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:31 np0005593103 certmonger[38997]: " Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:31 np0005593103 certmonger[38997]: MIIFijCCA/KgAwIBAgIQW7R8sNrD/5+bMttiat8JCDANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:31 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:31 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDQzMVoXDTI4MDEyNDA4MDQzMVowPzERMA8GA1UECgwI Jan 23 08:04:31 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdtdC5vb28u Jan 23 08:04:31 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMDmBIQxKAkmbkUF Jan 23 08:04:31 np0005593103 certmonger[38997]: l0hlmLNYqgMIbUF1MZWKpDTGpyw504ZO7vL054LUFOklkLcLCMiA9JByUZNdKskx Jan 23 08:04:31 np0005593103 certmonger[38997]: R9m2muSYgCN636YPog6HUdx3pMCsSI+eMumSpsUgprF2Z1QX7dd3LHx/aLOg2UFl Jan 23 08:04:31 np0005593103 certmonger[38997]: StXxU8NNiibLdvTKaVJNdjzP3us2DxgecN27Dw4IO9QDLHeI/r8EglSyC6K255kb Jan 23 08:04:31 np0005593103 certmonger[38997]: w0r0HOfDiOFQOyIdecSS+bUh7KKwAr7N7sP6XG8I2b7aMH2NmmWWq+RgeVe94YSe Jan 23 08:04:31 np0005593103 certmonger[38997]: MdCHFhUJLcOYN+gEhLcz3g5OqcXZpR5B/73ihTqr0NiZKt+TikrniUamehIuDLt0 Jan 23 08:04:31 np0005593103 certmonger[38997]: BgzKp4MCAwEAAaOCAgwwggIIMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:04:31 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:04:31 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:04:31 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:04:31 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:04:31 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCz1 Jan 23 08:04:31 np0005593103 certmonger[38997]: hN2hFccXjiHagN5OnWt0FhPDMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU5MzEwMy5z Jan 23 08:04:31 np0005593103 certmonger[38997]: dG9yYWdlbWdtdC5vb28udGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50 Jan 23 08:04:31 np0005593103 certmonger[38997]: ZXN0oEIGCisGAQQBgjcUAgOgNAwyaGFwcm94eS9ucDAwMDU1OTMxMDMuc3RvcmFn Jan 23 08:04:31 np0005593103 certmonger[38997]: ZW1nbXQub29vLnRlc3RAT09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVT Jan 23 08:04:31 np0005593103 certmonger[38997]: VKE3MDWgAwIBAaEuMCwbB2hhcHJveHkbIW5wMDAwNTU5MzEwMy5zdG9yYWdlbWdt Jan 23 08:04:31 np0005593103 certmonger[38997]: dC5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAPdUCk91F9hL/rlFkQ2TtMIKx Jan 23 08:04:31 np0005593103 certmonger[38997]: KscPIDcMfG22LMwjTDoAj1B8KdxdWkSr3k/VYSTFl113tt2xpjNQXQFSgZ92lLlu Jan 23 08:04:31 np0005593103 certmonger[38997]: 5kJ0q49otUHmO6xmXQR5hpGkuYZklBa6pS3iG4hNbxFUwqV6o+a+zo+Qck1oFHZd Jan 23 08:04:31 np0005593103 certmonger[38997]: bTysH031nRPJvB/yJgHCf9VN/k+FEH8pi/6XGBmdQmfvmjffFCUSmAIDNuTdNPI+ Jan 23 08:04:31 np0005593103 certmonger[38997]: xYuHOYDPLKsIe3RRBeUA37LQM8KXDQgujOf7UFatpUMUxmjp0HLf6qht85ijhLmn Jan 23 08:04:31 np0005593103 certmonger[38997]: D/9eIqP7XVZwaWpR30nWZS1EupC75+fn6M2zToBaqd2U926SjZufQQ3VsZ865u+N Jan 23 08:04:31 np0005593103 certmonger[38997]: rBA4WQsNrAAG0dum7vVDfH3vJYnQ4XJ9QJBxajH9mPc275DsjqboVfu+rUn6uNfg Jan 23 08:04:31 np0005593103 certmonger[38997]: UAQgPpnhqdKLOWoV3K5/DRIt05PH0mGRlKGNoVJVcra/yHCTXkNJNiMW8RUJzQnm Jan 23 08:04:31 np0005593103 certmonger[38997]: bSrZKsXmVErHpHJ45c9Yep3lcfDBU1/WFFonn8nV Jan 23 08:04:31 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:31 np0005593103 certmonger[38997]: ". Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] No hooks set for pre-save command. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:31 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:31 np0005593103 certmonger[41437]: Certificate in file "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" issued by CA and saved. Jan 23 08:04:31 np0005593103 certmonger[38997]: 2026-01-23 08:04:31 [38997] Wrote to /var/lib/certmonger/requests/20260123080430 Jan 23 08:04:32 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:32 np0005593103 python3[41453]: ansible-certificate_request Invoked with name=haproxy-internal_api-cert dns=['np0005593103.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['haproxy/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012cp "/etc/pki/tls/private/haproxy-internal_api-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:32 np0005593103 certmonger[38997]: 2026-01-23 08:04:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:32 np0005593103 certmonger[38997]: 2026-01-23 08:04:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:32 np0005593103 certmonger[38997]: 2026-01-23 08:04:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:32 np0005593103 certmonger[38997]: 2026-01-23 08:04:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:32 np0005593103 certmonger[38997]: 2026-01-23 08:04:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:32 np0005593103 certmonger[38997]: 2026-01-23 08:04:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:32 np0005593103 certmonger[38997]: 2026-01-23 08:04:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:32 np0005593103 certmonger[38997]: 2026-01-23 08:04:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:32 np0005593103 certmonger[38997]: 2026-01-23 08:04:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:04:33 np0005593103 certmonger[41463]: overcloud.internalapi.ooo.test Jan 23 08:04:33 np0005593103 certmonger[41463]: " for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:04:33 np0005593103 certmonger[41463]: " for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:33 np0005593103 certmonger[41463]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:04:33 np0005593103 certmonger[41463]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA9cChBwuv Jan 23 08:04:33 np0005593103 certmonger[41463]: HzVuPjyka6Ertj0fWrbYIgKSVFpWkDzVBqpsKkvbxf0ZfYuS0vgsrW0Q70mdKYwi Jan 23 08:04:33 np0005593103 certmonger[41463]: sqFa8heuombOY5FUeHU9lY/7AC6IUu0oq5YMmGFBJZAS+2HW5LMxqQ/jCnmxHldo Jan 23 08:04:33 np0005593103 certmonger[41463]: vN6TRfLUNpCVfGUtmR9WvzldoTyVFWCCh9cQ0qMNn8qGjW2L+ApP+0hRazIxod6u Jan 23 08:04:33 np0005593103 certmonger[41463]: oT4T66/QeepxefJlJyiHoxRUmExkU2GbDVqq8GWdkpz91u7C4ea5GSw4nYkyS/c3 Jan 23 08:04:33 np0005593103 certmonger[41463]: gWSyoF5n9JTkeBlzi28kwenQSnrJu7qVXohqDpMQO96+/VMi4y9iq2E499oMSMa4 Jan 23 08:04:33 np0005593103 certmonger[41463]: fgzKP18vd4nmEwIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:04:33 np0005593103 certmonger[41463]: ADIAMwAwADgAMAA0ADMAMjCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Jan 23 08:04:33 np0005593103 certmonger[41463]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:04:33 np0005593103 certmonger[41463]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3 Jan 23 08:04:33 np0005593103 certmonger[41463]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0 Jan 23 08:04:33 np0005593103 certmonger[41463]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Jan 23 08:04:33 np0005593103 certmonger[41463]: GwdoYXByb3h5GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYD Jan 23 08:04:33 np0005593103 certmonger[41463]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Jan 23 08:04:33 np0005593103 certmonger[41463]: BBYEFKbL6fBcyWaCNuPSVTpMo2J/gxfOMA0GCSqGSIb3DQEBCwUAA4IBAQDcBLAu Jan 23 08:04:33 np0005593103 certmonger[41463]: BwG7WQIHCfTVwKg6fvG62bMaJvMuDKCd4xIrFwZ2JoMWzX6AOXaoWeGIfJtSe6pl Jan 23 08:04:33 np0005593103 certmonger[41463]: JZGyUs+yWea1xEe8jeM+FIbhOnOnkL1poC9/Io8mXS5TBWwd2ve93LLca0O65q+u Jan 23 08:04:33 np0005593103 certmonger[41463]: y5572FwbdkMD0PHwT76T0i6isDA0TPdkdcjEd1pLWK91ejWUAOF/jODt/N7oKyy2 Jan 23 08:04:33 np0005593103 certmonger[41463]: MuBsBFYbPYWtgLVh1neCzYZtmh4ruFlIiFO05JduUiypXpRwlOF74VXIE5ogSI00 Jan 23 08:04:33 np0005593103 certmonger[41463]: nqx/eotdQ0evpqBxCZtv8nZpGo/oVv+LNIEkfJ2dvkWBGMTY8KQAwJJaPjt+kuxy Jan 23 08:04:33 np0005593103 certmonger[41463]: y2Qwi3oYBhCE9bSv Jan 23 08:04:33 np0005593103 certmonger[41463]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:33 np0005593103 certmonger[41463]: " for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA9cChBwuvHzVuPjyka6Ertj0fWrbYIgKSVFpWkDzVBqpsKkvbxf0ZfYuS0vgsrW0Q70mdKYwisqFa8heuombOY5FUeHU9lY/7AC6IUu0oq5YMmGFBJZAS+2HW5LMxqQ/jCnmxHldovN6TRfLUNpCVfGUtmR9WvzldoTyVFWCCh9cQ0qMNn8qGjW2L+ApP+0hRazIxod6uoT4T66/QeepxefJlJyiHoxRUmExkU2GbDVqq8GWdkpz91u7C4ea5GSw4nYkyS/c3gWSyoF5n9JTkeBlzi28kwenQSnrJu7qVXohqDpMQO96+/VMi4y9iq2E499oMSMa4fgzKP18vd4nmEwIDAQAB" for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:33 np0005593103 certmonger[41463]: 2026-01-23 08:04:33 [41463] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[41463]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:33 np0005593103 certmonger[41463]: Certificate: "MIIFizCCA/OgAwIBAgIRAKJvmmxXfe9A9Ntv5lD2ExgwDQYJKoZIhvcNAQELBQAwMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0yNjAxMjMwODA0MzNaFw0yODAxMjQwODA0MzNaMD8xETAPBgNVBAoMCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQD1wKEHC68fNW4+PKRroSu2PR9attgiApJUWlaQPNUGqmwqS9vF/Rl9i5LS+CytbRDvSZ0pjCKyoVryF66iZs5jkVR4dT2Vj/sALohS7SirlgyYYUElkBL7YdbkszGpD+MKebEeV2i83pNF8tQ2kJV8ZS2ZH1a/OV2hPJUVYIKH1xDSow2fyoaNbYv4Ck/7SFFrMjGh3q6hPhPrr9B56nF58mUnKIejFFSYTGRTYZsNWqrwZZ2SnP3W7sLh5rkZLDidiTJL9zeBZLKgXmf0lOR4GXOLbyTB6dBKesm7upVeiGoOkxA73r79UyLjL2KrYTj32gxIxrh+DMo/Xy93ieYTAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQfQSZ+BlrnjVu+SlocHtncBJuf1DCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAI43+L4PsnZB81ts2GHRhUaDRKQwBxgnDp2S3c9B5EYDVer8+k7iSxrORwpZuZFuC2qeypAxbe+0uNuD/hVvETlEUvRmG4J+b6nKOGU48N6VszeaEkf9QF3bcg0SM/48eqzwPHwQZF307qMjPotdnn+MQqXunXY6Y/TVLSMwg1tm1+wiHBiac6L7MuWExYiWFJPhMdjr1JnLgcwaKhoCc04Ni+xFAqzrU0bgCiuVDvgGbOYe7BfHgHeIpssrA1/TfOL+/zIvGjPsecC2f5PCPui4SR9qEVKTxEaRf41//kT41uDnMs/Nj3V0gorBmetmHriHrsKL9RjuvM4FglQNZSG7wZ6S6XQ9i0Zf6vM7DYl8GsktfbgtcRV2I0E7wKGTZz48bSRQ2GONvdgLrJT/MWdAuUuvZCAXZHblLrFJh5Nkc+cB0TG8OBOiLYF4LXz2EotxWO2DyNo5+YQwxT4Pq1/1u/PaAF0UxRBGeJanKNttDMKhq8MWyuyVbq97x6G95A==" Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Certificate submission still ongoing. Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Certificate submission attempt complete. Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Child status = 0. Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Child output: Jan 23 08:04:33 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:33 np0005593103 certmonger[38997]: MIIFizCCA/OgAwIBAgIRAKJvmmxXfe9A9Ntv5lD2ExgwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:33 np0005593103 certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:33 np0005593103 certmonger[38997]: cml0eTAeFw0yNjAxMjMwODA0MzNaFw0yODAxMjQwODA0MzNaMD8xETAPBgNVBAoM Jan 23 08:04:33 np0005593103 certmonger[38997]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:04:33 np0005593103 certmonger[38997]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQD1wKEHC68fNW4+ Jan 23 08:04:33 np0005593103 certmonger[38997]: PKRroSu2PR9attgiApJUWlaQPNUGqmwqS9vF/Rl9i5LS+CytbRDvSZ0pjCKyoVry Jan 23 08:04:33 np0005593103 certmonger[38997]: F66iZs5jkVR4dT2Vj/sALohS7SirlgyYYUElkBL7YdbkszGpD+MKebEeV2i83pNF Jan 23 08:04:33 np0005593103 certmonger[38997]: 8tQ2kJV8ZS2ZH1a/OV2hPJUVYIKH1xDSow2fyoaNbYv4Ck/7SFFrMjGh3q6hPhPr Jan 23 08:04:33 np0005593103 certmonger[38997]: r9B56nF58mUnKIejFFSYTGRTYZsNWqrwZZ2SnP3W7sLh5rkZLDidiTJL9zeBZLKg Jan 23 08:04:33 np0005593103 certmonger[38997]: Xmf0lOR4GXOLbyTB6dBKesm7upVeiGoOkxA73r79UyLjL2KrYTj32gxIxrh+DMo/ Jan 23 08:04:33 np0005593103 certmonger[38997]: Xy93ieYTAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:33 np0005593103 certmonger[38997]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:33 np0005593103 certmonger[38997]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:33 np0005593103 certmonger[38997]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:33 np0005593103 certmonger[38997]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:33 np0005593103 certmonger[38997]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQf Jan 23 08:04:33 np0005593103 certmonger[38997]: QSZ+BlrnjVu+SlocHtncBJuf1DCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDMu Jan 23 08:04:33 np0005593103 certmonger[38997]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Jan 23 08:04:33 np0005593103 certmonger[38997]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAzLmludGVy Jan 23 08:04:33 np0005593103 certmonger[38997]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Jan 23 08:04:33 np0005593103 certmonger[38997]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxh Jan 23 08:04:33 np0005593103 certmonger[38997]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAI43+L4PsnZB81ts2GHRhUaD Jan 23 08:04:33 np0005593103 certmonger[38997]: RKQwBxgnDp2S3c9B5EYDVer8+k7iSxrORwpZuZFuC2qeypAxbe+0uNuD/hVvETlE Jan 23 08:04:33 np0005593103 certmonger[38997]: UvRmG4J+b6nKOGU48N6VszeaEkf9QF3bcg0SM/48eqzwPHwQZF307qMjPotdnn+M Jan 23 08:04:33 np0005593103 certmonger[38997]: QqXunXY6Y/TVLSMwg1tm1+wiHBiac6L7MuWExYiWFJPhMdjr1JnLgcwaKhoCc04N Jan 23 08:04:33 np0005593103 certmonger[38997]: i+xFAqzrU0bgCiuVDvgGbOYe7BfHgHeIpssrA1/TfOL+/zIvGjPsecC2f5PCPui4 Jan 23 08:04:33 np0005593103 certmonger[38997]: SR9qEVKTxEaRf41//kT41uDnMs/Nj3V0gorBmetmHriHrsKL9RjuvM4FglQNZSG7 Jan 23 08:04:33 np0005593103 certmonger[38997]: wZ6S6XQ9i0Zf6vM7DYl8GsktfbgtcRV2I0E7wKGTZz48bSRQ2GONvdgLrJT/MWdA Jan 23 08:04:33 np0005593103 certmonger[38997]: uUuvZCAXZHblLrFJh5Nkc+cB0TG8OBOiLYF4LXz2EotxWO2DyNo5+YQwxT4Pq1/1 Jan 23 08:04:33 np0005593103 certmonger[38997]: u/PaAF0UxRBGeJanKNttDMKhq8MWyuyVbq97x6G95A== Jan 23 08:04:33 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:33 np0005593103 certmonger[38997]: " Jan 23 08:04:33 np0005593103 certmonger[41465]: 2026-01-23 08:04:33 [41465] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:33 np0005593103 certmonger[41465]: MIIFizCCA/OgAwIBAgIRAKJvmmxXfe9A9Ntv5lD2ExgwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:33 np0005593103 certmonger[41465]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:33 np0005593103 certmonger[41465]: cml0eTAeFw0yNjAxMjMwODA0MzNaFw0yODAxMjQwODA0MzNaMD8xETAPBgNVBAoM Jan 23 08:04:33 np0005593103 certmonger[41465]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:04:33 np0005593103 certmonger[41465]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQD1wKEHC68fNW4+ Jan 23 08:04:33 np0005593103 certmonger[41465]: PKRroSu2PR9attgiApJUWlaQPNUGqmwqS9vF/Rl9i5LS+CytbRDvSZ0pjCKyoVry Jan 23 08:04:33 np0005593103 certmonger[41465]: F66iZs5jkVR4dT2Vj/sALohS7SirlgyYYUElkBL7YdbkszGpD+MKebEeV2i83pNF Jan 23 08:04:33 np0005593103 certmonger[41465]: 8tQ2kJV8ZS2ZH1a/OV2hPJUVYIKH1xDSow2fyoaNbYv4Ck/7SFFrMjGh3q6hPhPr Jan 23 08:04:33 np0005593103 certmonger[41465]: r9B56nF58mUnKIejFFSYTGRTYZsNWqrwZZ2SnP3W7sLh5rkZLDidiTJL9zeBZLKg Jan 23 08:04:33 np0005593103 certmonger[41465]: Xmf0lOR4GXOLbyTB6dBKesm7upVeiGoOkxA73r79UyLjL2KrYTj32gxIxrh+DMo/ Jan 23 08:04:33 np0005593103 certmonger[41465]: Xy93ieYTAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:33 np0005593103 certmonger[41465]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:33 np0005593103 certmonger[41465]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:33 np0005593103 certmonger[41465]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:33 np0005593103 certmonger[41465]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:33 np0005593103 certmonger[41465]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQf Jan 23 08:04:33 np0005593103 certmonger[41465]: QSZ+BlrnjVu+SlocHtncBJuf1DCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDMu Jan 23 08:04:33 np0005593103 certmonger[41465]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Jan 23 08:04:33 np0005593103 certmonger[41465]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAzLmludGVy Jan 23 08:04:33 np0005593103 certmonger[41465]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Jan 23 08:04:33 np0005593103 certmonger[41465]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxh Jan 23 08:04:33 np0005593103 certmonger[41465]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAI43+L4PsnZB81ts2GHRhUaD Jan 23 08:04:33 np0005593103 certmonger[41465]: RKQwBxgnDp2S3c9B5EYDVer8+k7iSxrORwpZuZFuC2qeypAxbe+0uNuD/hVvETlE Jan 23 08:04:33 np0005593103 certmonger[41465]: UvRmG4J+b6nKOGU48N6VszeaEkf9QF3bcg0SM/48eqzwPHwQZF307qMjPotdnn+M Jan 23 08:04:33 np0005593103 certmonger[41465]: QqXunXY6Y/TVLSMwg1tm1+wiHBiac6L7MuWExYiWFJPhMdjr1JnLgcwaKhoCc04N Jan 23 08:04:33 np0005593103 certmonger[41465]: i+xFAqzrU0bgCiuVDvgGbOYe7BfHgHeIpssrA1/TfOL+/zIvGjPsecC2f5PCPui4 Jan 23 08:04:33 np0005593103 certmonger[41465]: SR9qEVKTxEaRf41//kT41uDnMs/Nj3V0gorBmetmHriHrsKL9RjuvM4FglQNZSG7 Jan 23 08:04:33 np0005593103 certmonger[41465]: wZ6S6XQ9i0Zf6vM7DYl8GsktfbgtcRV2I0E7wKGTZz48bSRQ2GONvdgLrJT/MWdA Jan 23 08:04:33 np0005593103 certmonger[41465]: uUuvZCAXZHblLrFJh5Nkc+cB0TG8OBOiLYF4LXz2EotxWO2DyNo5+YQwxT4Pq1/1 Jan 23 08:04:33 np0005593103 certmonger[41465]: u/PaAF0UxRBGeJanKNttDMKhq8MWyuyVbq97x6G95A== Jan 23 08:04:33 np0005593103 certmonger[41465]: -----END CERTIFICATE----- Jan 23 08:04:33 np0005593103 certmonger[41465]: ". Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Certificate submission still ongoing. Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Certificate submission postprocessing complete. Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Child status = 0. Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Child output: Jan 23 08:04:33 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nu/PaAF0UxRBGeJanKNttDMKhq8MWyuyVbq97x6G95A==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:33 np0005593103 certmonger[38997]: " Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:33 np0005593103 certmonger[38997]: MIIFizCCA/OgAwIBAgIRAKJvmmxXfe9A9Ntv5lD2ExgwDQYJKoZIhvcNAQELBQAw Jan 23 08:04:33 np0005593103 certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:04:33 np0005593103 certmonger[38997]: cml0eTAeFw0yNjAxMjMwODA0MzNaFw0yODAxMjQwODA0MzNaMD8xETAPBgNVBAoM Jan 23 08:04:33 np0005593103 certmonger[38997]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:04:33 np0005593103 certmonger[38997]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQD1wKEHC68fNW4+ Jan 23 08:04:33 np0005593103 certmonger[38997]: PKRroSu2PR9attgiApJUWlaQPNUGqmwqS9vF/Rl9i5LS+CytbRDvSZ0pjCKyoVry Jan 23 08:04:33 np0005593103 certmonger[38997]: F66iZs5jkVR4dT2Vj/sALohS7SirlgyYYUElkBL7YdbkszGpD+MKebEeV2i83pNF Jan 23 08:04:33 np0005593103 certmonger[38997]: 8tQ2kJV8ZS2ZH1a/OV2hPJUVYIKH1xDSow2fyoaNbYv4Ck/7SFFrMjGh3q6hPhPr Jan 23 08:04:33 np0005593103 certmonger[38997]: r9B56nF58mUnKIejFFSYTGRTYZsNWqrwZZ2SnP3W7sLh5rkZLDidiTJL9zeBZLKg Jan 23 08:04:33 np0005593103 certmonger[38997]: Xmf0lOR4GXOLbyTB6dBKesm7upVeiGoOkxA73r79UyLjL2KrYTj32gxIxrh+DMo/ Jan 23 08:04:33 np0005593103 certmonger[38997]: Xy93ieYTAgMBAAGjggIMMIICCDAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:04:33 np0005593103 certmonger[38997]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:33 np0005593103 certmonger[38997]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:04:33 np0005593103 certmonger[38997]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:04:33 np0005593103 certmonger[38997]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:04:33 np0005593103 certmonger[38997]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBQf Jan 23 08:04:33 np0005593103 certmonger[38997]: QSZ+BlrnjVu+SlocHtncBJuf1DCB5QYDVR0RBIHdMIHagiFucDAwMDU1OTMxMDMu Jan 23 08:04:33 np0005593103 certmonger[38997]: aW50ZXJuYWxhcGkub29vLnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28u Jan 23 08:04:33 np0005593103 certmonger[38997]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMmhhcHJveHkvbnAwMDA1NTkzMTAzLmludGVy Jan 23 08:04:33 np0005593103 certmonger[38997]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Jan 23 08:04:33 np0005593103 certmonger[38997]: U1ShNzA1oAMCAQGhLjAsGwdoYXByb3h5GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxh Jan 23 08:04:33 np0005593103 certmonger[38997]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAI43+L4PsnZB81ts2GHRhUaD Jan 23 08:04:33 np0005593103 certmonger[38997]: RKQwBxgnDp2S3c9B5EYDVer8+k7iSxrORwpZuZFuC2qeypAxbe+0uNuD/hVvETlE Jan 23 08:04:33 np0005593103 certmonger[38997]: UvRmG4J+b6nKOGU48N6VszeaEkf9QF3bcg0SM/48eqzwPHwQZF307qMjPotdnn+M Jan 23 08:04:33 np0005593103 certmonger[38997]: QqXunXY6Y/TVLSMwg1tm1+wiHBiac6L7MuWExYiWFJPhMdjr1JnLgcwaKhoCc04N Jan 23 08:04:33 np0005593103 certmonger[38997]: i+xFAqzrU0bgCiuVDvgGbOYe7BfHgHeIpssrA1/TfOL+/zIvGjPsecC2f5PCPui4 Jan 23 08:04:33 np0005593103 certmonger[38997]: SR9qEVKTxEaRf41//kT41uDnMs/Nj3V0gorBmetmHriHrsKL9RjuvM4FglQNZSG7 Jan 23 08:04:33 np0005593103 certmonger[38997]: wZ6S6XQ9i0Zf6vM7DYl8GsktfbgtcRV2I0E7wKGTZz48bSRQ2GONvdgLrJT/MWdA Jan 23 08:04:33 np0005593103 certmonger[38997]: uUuvZCAXZHblLrFJh5Nkc+cB0TG8OBOiLYF4LXz2EotxWO2DyNo5+YQwxT4Pq1/1 Jan 23 08:04:33 np0005593103 certmonger[38997]: u/PaAF0UxRBGeJanKNttDMKhq8MWyuyVbq97x6G95A== Jan 23 08:04:33 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:33 np0005593103 certmonger[38997]: ". Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] No hooks set for pre-save command. Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 certmonger[38997]: 2026-01-23 08:04:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:33 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:33 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:34 np0005593103 certmonger[38997]: 2026-01-23 08:04:34 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:34 np0005593103 certmonger[38997]: 2026-01-23 08:04:34 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:34 np0005593103 certmonger[41535]: Certificate in file "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" issued by CA and saved. Jan 23 08:04:34 np0005593103 certmonger[38997]: 2026-01-23 08:04:34 [38997] Wrote to /var/lib/certmonger/requests/20260123080432 Jan 23 08:04:34 np0005593103 python3[41551]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q lvm2 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:04:34 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:35 np0005593103 python3[41568]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:04:44 np0005593103 podman[41569]: 2026-01-23 08:04:35.758484667 +0000 UTC m=+0.039872625 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Jan 23 08:04:44 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:44 np0005593103 python3[41649]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 cluster.common.tag/manila-share:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:04:44 np0005593103 podman[41650]: 2026-01-23 08:04:44.490112157 +0000 UTC m=+0.047671339 image tag b9682dee21d7c5836da0f5094cc87a67e8c855fb08692e50824e31ad6f3d7b7f cluster.common.tag/manila-share:pcmklatest Jan 23 08:04:44 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:45 np0005593103 python3[41677]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:04:45 np0005593103 python3[41697]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:48 np0005593103 python3[41714]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:04:51 np0005593103 python3[41731]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:52 np0005593103 python3[41747]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:04:53 np0005593103 python3[41763]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:04:54 np0005593103 python3[41781]: ansible-certificate_request Invoked with name=memcached dns=['np0005593103.internalapi.ooo.test'] principal=['memcached/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep memcached)#012service_crt="/etc/pki/tls/certs/memcached.crt"#012service_key="/etc/pki/tls/private/memcached.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec -u root "$container_name" chown memcached:memcached "$service_crt"#012podman exec -u root "$container_name" chown memcached:memcached "$service_key"#012# Send refresh_certs command to memcached to read the new certificate#012memcached_ip="$(hiera -c /etc/puppet/hiera.yaml memcached::listen_ip.0 127.0.0.1)"#012memcached_port="$(hiera -c /etc/puppet/hiera.yaml memcached::tcp_port 11211)"#012echo refresh_certs | openssl s_client -connect $memcached_ip:$memcached_port#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:04:54 np0005593103 certmonger[41791]: " for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_REQ_PRINCIPAL" to "memcached/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:04:54 np0005593103 certmonger[41791]: " for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:04:54 np0005593103 certmonger[41791]: MIID3DCCAsQCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:04:54 np0005593103 certmonger[41791]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs+kKbTCM Jan 23 08:04:54 np0005593103 certmonger[41791]: buhBWCz33WIhNDibFYDWkzK1JEi8kuzQot2OGrWSW0LScd9hZpPNilqvGnOqpWXy Jan 23 08:04:54 np0005593103 certmonger[41791]: veMZjVqbt4o+/IZ3YUVNybBPTkaHbvqb+YHsUiF9sqKYOrjJnYu95ZxRdNfHpN/z Jan 23 08:04:54 np0005593103 certmonger[41791]: EXd6zFOPh+Rxbkn5LcQUcYNX/Esq31aJCyewvTy2UoWTeVzXbkRPkHKoDLIUt8k9 Jan 23 08:04:54 np0005593103 certmonger[41791]: 1a5ceqGbIj4REvU06q6syzZ9pyMTWW1YUL7C5kiPPJEZvhEhyg30Npc3nnnGy8sT Jan 23 08:04:54 np0005593103 certmonger[41791]: vdd87750hFC3jXpbq/Y5rZgnSMVX5JxUDCIWUTFGD8kgHEesNZdWH/DvCXGVIdEU Jan 23 08:04:54 np0005593103 certmonger[41791]: lsQX0XpGQgMDLwIDAQABoIIBaTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:04:54 np0005593103 certmonger[41791]: ADIAMwAwADgAMAA0ADUANDCCATgGCSqGSIb3DQEJDjGCASkwggElMAsGA1UdDwQE Jan 23 08:04:54 np0005593103 certmonger[41791]: AwIFoDCByQYDVR0RBIHBMIG+giFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:04:54 np0005593103 certmonger[41791]: LnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQvbnAwMDA1NTkzMTAzLmlu Jan 23 08:04:54 np0005593103 certmonger[41791]: dGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisGAQUCAqBJMEegChsIT09P Jan 23 08:04:54 np0005593103 certmonger[41791]: LlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5wMDAwNTU5MzEwMy5pbnRl Jan 23 08:04:54 np0005593103 certmonger[41791]: cm5hbGFwaS5vb28udGVzdDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Jan 23 08:04:54 np0005593103 certmonger[41791]: DAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUpsvp8FzJZoI249JVOkyjYn+DF84wDQYJ Jan 23 08:04:54 np0005593103 certmonger[41791]: KoZIhvcNAQELBQADggEBAGz0e3sEMIO+XqVx9nuDPi17XMPplEZYv53liBgmjogY Jan 23 08:04:54 np0005593103 certmonger[41791]: Dgwp+iLO+HC9a4NMmGMMi4H5vqwN6crsGdaps5QZtj7WeSqIoTzPFjxIjl8ZOP+H Jan 23 08:04:54 np0005593103 certmonger[41791]: nmShUf21O5mvS3J9ArNMsfcahA2Jr9xWHuTkET3X36XlDfyxXEoCbFzNebhMEFQF Jan 23 08:04:54 np0005593103 certmonger[41791]: 3uFfdc+rfvlg2bXC6okjqTEFi349gsIwo0okuKA9dXwzHWiCibCkzPLZHFQbRD+5 Jan 23 08:04:54 np0005593103 certmonger[41791]: 2mNuYWhHko6LKAvWinic4qkWtbgWyvMkdwG2s+tUIPc5hqje3TjfVbE2snzsZd3K Jan 23 08:04:54 np0005593103 certmonger[41791]: DhozL3bRlXq14hGCcw15evsFtauXCxrPvIeqq+O57oE= Jan 23 08:04:54 np0005593103 certmonger[41791]: -----END CERTIFICATE REQUEST----- Jan 23 08:04:54 np0005593103 certmonger[41791]: " for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs+kKbTCMbuhBWCz33WIhNDibFYDWkzK1JEi8kuzQot2OGrWSW0LScd9hZpPNilqvGnOqpWXyveMZjVqbt4o+/IZ3YUVNybBPTkaHbvqb+YHsUiF9sqKYOrjJnYu95ZxRdNfHpN/zEXd6zFOPh+Rxbkn5LcQUcYNX/Esq31aJCyewvTy2UoWTeVzXbkRPkHKoDLIUt8k91a5ceqGbIj4REvU06q6syzZ9pyMTWW1YUL7C5kiPPJEZvhEhyg30Npc3nnnGy8sTvdd87750hFC3jXpbq/Y5rZgnSMVX5JxUDCIWUTFGD8kgHEesNZdWH/DvCXGVIdEUlsQX0XpGQgMDLwIDAQAB" for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:54 np0005593103 certmonger[41791]: 2026-01-23 08:04:54 [41791] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:04:54 np0005593103 certmonger[38997]: 2026-01-23 08:04:54 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:54 np0005593103 certmonger[41791]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:04:55 np0005593103 certmonger[41791]: Certificate: "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" Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Certificate submission still ongoing. Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Certificate submission attempt complete. Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Child status = 0. Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Child output: Jan 23 08:04:55 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:04:55 np0005593103 certmonger[38997]: MIIFbjCCA9agAwIBAgIQWd8U7xSFSPKr8sPlcwnZaDANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:55 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:55 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDQ1NFoXDTI4MDEyNDA4MDQ1NFowPzERMA8GA1UECgwI Jan 23 08:04:55 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:04:55 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALPpCm0wjG7oQVgs Jan 23 08:04:55 np0005593103 certmonger[38997]: 991iITQ4mxWA1pMytSRIvJLs0KLdjhq1kltC0nHfYWaTzYparxpzqqVl8r3jGY1a Jan 23 08:04:55 np0005593103 certmonger[38997]: m7eKPvyGd2FFTcmwT05Gh276m/mB7FIhfbKimDq4yZ2LveWcUXTXx6Tf8xF3esxT Jan 23 08:04:55 np0005593103 certmonger[38997]: j4fkcW5J+S3EFHGDV/xLKt9WiQsnsL08tlKFk3lc125ET5ByqAyyFLfJPdWuXHqh Jan 23 08:04:55 np0005593103 certmonger[38997]: myI+ERL1NOqurMs2facjE1ltWFC+wuZIjzyRGb4RIcoN9DaXN555xsvLE73XfO++ Jan 23 08:04:55 np0005593103 certmonger[38997]: dIRQt416W6v2Oa2YJ0jFV+ScVAwiFlExRg/JIBxHrDWXVh/w7wlxlSHRFJbEF9F6 Jan 23 08:04:55 np0005593103 certmonger[38997]: RkIDAy8CAwEAAaOCAfAwggHsMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:04:55 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:04:55 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:04:55 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:04:55 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:04:55 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJo0 Jan 23 08:04:55 np0005593103 certmonger[38997]: jFm/FxBys7Zjk6FnsMOpeocxMIHJBgNVHREEgcEwgb6CIW5wMDAwNTU5MzEwMy5p Jan 23 08:04:55 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9u Jan 23 08:04:55 np0005593103 certmonger[38997]: cDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYB Jan 23 08:04:55 np0005593103 certmonger[38997]: BQICoEkwR6AKGwhPT08uVEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAw Jan 23 08:04:55 np0005593103 certmonger[38997]: MDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IB Jan 23 08:04:55 np0005593103 certmonger[38997]: gQCfwnqvucF1jxo3bVpeeMSzAfo6nFHRVdNaL735SJ3OUtrdT0uNeU01LQg2WuEu Jan 23 08:04:55 np0005593103 certmonger[38997]: pi6lYf1TkYKjkEiAG81a7uSCrxI8l+DWnzHu0sBwo+r4VGKrgXPaa+y4kua8Z9e7 Jan 23 08:04:55 np0005593103 certmonger[38997]: QNFz5eAaSGq26eE3jThG+ary41dtl8x1VdybNUf76GcPSx5+j0wqPrIq8GiEXTmm Jan 23 08:04:55 np0005593103 certmonger[38997]: p/EOu0C75bmoBYg3udoIrvjmQ+zQCSoYOu6tN3dPmgPjHNCSF83/U8qomTkDYKgy Jan 23 08:04:55 np0005593103 certmonger[38997]: bPQUOnjgAMaRO+603bwxRbbJuez0aRaqX0LtRPHt61KhypI0I+tm8T1wcNWhv1SF Jan 23 08:04:55 np0005593103 certmonger[38997]: 1FtWfDyxSlqc5KAdfy/NJjO3GbS5OcQNlkETdRFfG6epxLAbGr9JN4+r+YVmzCHt Jan 23 08:04:55 np0005593103 certmonger[38997]: bYp7kWiSVcIx06P7A5KTToQtzswrU+FhlSoPWIYgbDttuXadsANCuL08O52mXd4s Jan 23 08:04:55 np0005593103 certmonger[38997]: TF0AeTUitg6ixq51LzBD+fQX0jwaR0aSskOBAefjgffJFz+ZSXa0BQMcNtD8X8JV Jan 23 08:04:55 np0005593103 certmonger[38997]: hoY= Jan 23 08:04:55 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:55 np0005593103 certmonger[38997]: " Jan 23 08:04:55 np0005593103 certmonger[41793]: 2026-01-23 08:04:55 [41793] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:04:55 np0005593103 certmonger[41793]: MIIFbjCCA9agAwIBAgIQWd8U7xSFSPKr8sPlcwnZaDANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:55 np0005593103 certmonger[41793]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:55 np0005593103 certmonger[41793]: aXR5MB4XDTI2MDEyMzA4MDQ1NFoXDTI4MDEyNDA4MDQ1NFowPzERMA8GA1UECgwI Jan 23 08:04:55 np0005593103 certmonger[41793]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:04:55 np0005593103 certmonger[41793]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALPpCm0wjG7oQVgs Jan 23 08:04:55 np0005593103 certmonger[41793]: 991iITQ4mxWA1pMytSRIvJLs0KLdjhq1kltC0nHfYWaTzYparxpzqqVl8r3jGY1a Jan 23 08:04:55 np0005593103 certmonger[41793]: m7eKPvyGd2FFTcmwT05Gh276m/mB7FIhfbKimDq4yZ2LveWcUXTXx6Tf8xF3esxT Jan 23 08:04:55 np0005593103 certmonger[41793]: j4fkcW5J+S3EFHGDV/xLKt9WiQsnsL08tlKFk3lc125ET5ByqAyyFLfJPdWuXHqh Jan 23 08:04:55 np0005593103 certmonger[41793]: myI+ERL1NOqurMs2facjE1ltWFC+wuZIjzyRGb4RIcoN9DaXN555xsvLE73XfO++ Jan 23 08:04:55 np0005593103 certmonger[41793]: dIRQt416W6v2Oa2YJ0jFV+ScVAwiFlExRg/JIBxHrDWXVh/w7wlxlSHRFJbEF9F6 Jan 23 08:04:55 np0005593103 certmonger[41793]: RkIDAy8CAwEAAaOCAfAwggHsMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:04:55 np0005593103 certmonger[41793]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:04:55 np0005593103 certmonger[41793]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:04:55 np0005593103 certmonger[41793]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:04:55 np0005593103 certmonger[41793]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:04:55 np0005593103 certmonger[41793]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJo0 Jan 23 08:04:55 np0005593103 certmonger[41793]: jFm/FxBys7Zjk6FnsMOpeocxMIHJBgNVHREEgcEwgb6CIW5wMDAwNTU5MzEwMy5p Jan 23 08:04:55 np0005593103 certmonger[41793]: bnRlcm5hbGFwaS5vb28udGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9u Jan 23 08:04:55 np0005593103 certmonger[41793]: cDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYB Jan 23 08:04:55 np0005593103 certmonger[41793]: BQICoEkwR6AKGwhPT08uVEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAw Jan 23 08:04:55 np0005593103 certmonger[41793]: MDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IB Jan 23 08:04:55 np0005593103 certmonger[41793]: gQCfwnqvucF1jxo3bVpeeMSzAfo6nFHRVdNaL735SJ3OUtrdT0uNeU01LQg2WuEu Jan 23 08:04:55 np0005593103 certmonger[41793]: pi6lYf1TkYKjkEiAG81a7uSCrxI8l+DWnzHu0sBwo+r4VGKrgXPaa+y4kua8Z9e7 Jan 23 08:04:55 np0005593103 certmonger[41793]: QNFz5eAaSGq26eE3jThG+ary41dtl8x1VdybNUf76GcPSx5+j0wqPrIq8GiEXTmm Jan 23 08:04:55 np0005593103 certmonger[41793]: p/EOu0C75bmoBYg3udoIrvjmQ+zQCSoYOu6tN3dPmgPjHNCSF83/U8qomTkDYKgy Jan 23 08:04:55 np0005593103 certmonger[41793]: bPQUOnjgAMaRO+603bwxRbbJuez0aRaqX0LtRPHt61KhypI0I+tm8T1wcNWhv1SF Jan 23 08:04:55 np0005593103 certmonger[41793]: 1FtWfDyxSlqc5KAdfy/NJjO3GbS5OcQNlkETdRFfG6epxLAbGr9JN4+r+YVmzCHt Jan 23 08:04:55 np0005593103 certmonger[41793]: bYp7kWiSVcIx06P7A5KTToQtzswrU+FhlSoPWIYgbDttuXadsANCuL08O52mXd4s Jan 23 08:04:55 np0005593103 certmonger[41793]: TF0AeTUitg6ixq51LzBD+fQX0jwaR0aSskOBAefjgffJFz+ZSXa0BQMcNtD8X8JV Jan 23 08:04:55 np0005593103 certmonger[41793]: hoY= Jan 23 08:04:55 np0005593103 certmonger[41793]: -----END CERTIFICATE----- Jan 23 08:04:55 np0005593103 certmonger[41793]: ". Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Certificate submission still ongoing. Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Certificate submission postprocessing complete. Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Child status = 0. Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Child output: Jan 23 08:04:55 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nhoY=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:04:55 np0005593103 certmonger[38997]: " Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:04:55 np0005593103 certmonger[38997]: MIIFbjCCA9agAwIBAgIQWd8U7xSFSPKr8sPlcwnZaDANBgkqhkiG9w0BAQsFADAz Jan 23 08:04:55 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:04:55 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDQ1NFoXDTI4MDEyNDA4MDQ1NFowPzERMA8GA1UECgwI Jan 23 08:04:55 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:04:55 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALPpCm0wjG7oQVgs Jan 23 08:04:55 np0005593103 certmonger[38997]: 991iITQ4mxWA1pMytSRIvJLs0KLdjhq1kltC0nHfYWaTzYparxpzqqVl8r3jGY1a Jan 23 08:04:55 np0005593103 certmonger[38997]: m7eKPvyGd2FFTcmwT05Gh276m/mB7FIhfbKimDq4yZ2LveWcUXTXx6Tf8xF3esxT Jan 23 08:04:55 np0005593103 certmonger[38997]: j4fkcW5J+S3EFHGDV/xLKt9WiQsnsL08tlKFk3lc125ET5ByqAyyFLfJPdWuXHqh Jan 23 08:04:55 np0005593103 certmonger[38997]: myI+ERL1NOqurMs2facjE1ltWFC+wuZIjzyRGb4RIcoN9DaXN555xsvLE73XfO++ Jan 23 08:04:55 np0005593103 certmonger[38997]: dIRQt416W6v2Oa2YJ0jFV+ScVAwiFlExRg/JIBxHrDWXVh/w7wlxlSHRFJbEF9F6 Jan 23 08:04:55 np0005593103 certmonger[38997]: RkIDAy8CAwEAAaOCAfAwggHsMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:04:55 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:04:55 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:04:55 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:04:55 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:04:55 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJo0 Jan 23 08:04:55 np0005593103 certmonger[38997]: jFm/FxBys7Zjk6FnsMOpeocxMIHJBgNVHREEgcEwgb6CIW5wMDAwNTU5MzEwMy5p Jan 23 08:04:55 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9u Jan 23 08:04:55 np0005593103 certmonger[38997]: cDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYB Jan 23 08:04:55 np0005593103 certmonger[38997]: BQICoEkwR6AKGwhPT08uVEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAw Jan 23 08:04:55 np0005593103 certmonger[38997]: MDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IB Jan 23 08:04:55 np0005593103 certmonger[38997]: gQCfwnqvucF1jxo3bVpeeMSzAfo6nFHRVdNaL735SJ3OUtrdT0uNeU01LQg2WuEu Jan 23 08:04:55 np0005593103 certmonger[38997]: pi6lYf1TkYKjkEiAG81a7uSCrxI8l+DWnzHu0sBwo+r4VGKrgXPaa+y4kua8Z9e7 Jan 23 08:04:55 np0005593103 certmonger[38997]: QNFz5eAaSGq26eE3jThG+ary41dtl8x1VdybNUf76GcPSx5+j0wqPrIq8GiEXTmm Jan 23 08:04:55 np0005593103 certmonger[38997]: p/EOu0C75bmoBYg3udoIrvjmQ+zQCSoYOu6tN3dPmgPjHNCSF83/U8qomTkDYKgy Jan 23 08:04:55 np0005593103 certmonger[38997]: bPQUOnjgAMaRO+603bwxRbbJuez0aRaqX0LtRPHt61KhypI0I+tm8T1wcNWhv1SF Jan 23 08:04:55 np0005593103 certmonger[38997]: 1FtWfDyxSlqc5KAdfy/NJjO3GbS5OcQNlkETdRFfG6epxLAbGr9JN4+r+YVmzCHt Jan 23 08:04:55 np0005593103 certmonger[38997]: bYp7kWiSVcIx06P7A5KTToQtzswrU+FhlSoPWIYgbDttuXadsANCuL08O52mXd4s Jan 23 08:04:55 np0005593103 certmonger[38997]: TF0AeTUitg6ixq51LzBD+fQX0jwaR0aSskOBAefjgffJFz+ZSXa0BQMcNtD8X8JV Jan 23 08:04:55 np0005593103 certmonger[38997]: hoY= Jan 23 08:04:55 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:04:55 np0005593103 certmonger[38997]: ". Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] No hooks set for pre-save command. Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:55 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:55 np0005593103 certmonger[41862]: Certificate in file "/etc/pki/tls/certs/memcached.crt" issued by CA and saved. Jan 23 08:04:55 np0005593103 certmonger[38997]: 2026-01-23 08:04:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080454 Jan 23 08:04:56 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:04:56 np0005593103 python3[41878]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:04:57 np0005593103 python3[41898]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:00 np0005593103 python3[41915]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:03 np0005593103 python3[41932]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:03 np0005593103 python3[41948]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:04 np0005593103 python3[41964]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:04 np0005593103 python3[41982]: ansible-certificate_request Invoked with name=metrics_qdr dns=['np0005593103.internalapi.ooo.test'] principal=['metrics_qdr/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep metrics_qdr)#012service_crt="/etc/pki/tls/certs/metrics_qdr.crt"#012service_key="/etc/pki/tls/private/metrics_qdr.key#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_crt"#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_key"#012# Trigger a container restart to read the new certificate#012podman restart "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:05:05 np0005593103 certmonger[41992]: " for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_REQ_PRINCIPAL" to "metrics_qdr/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:05:05 np0005593103 certmonger[41992]: " for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:05 np0005593103 certmonger[41992]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:05:05 np0005593103 certmonger[41992]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv1YKlqtU Jan 23 08:05:05 np0005593103 certmonger[41992]: ftMlTpfvuolbeJi21gOBONw5C0YPY8IurQKEN8wktBKsIYGKLu3OR6XAcMGzQgDV Jan 23 08:05:05 np0005593103 certmonger[41992]: EROmcUV0HqoZPIWen57zCXIU9xkED26lAfA11MlciXth7PedRUkZ9m5WqvnxOiZZ Jan 23 08:05:05 np0005593103 certmonger[41992]: hq6KNTYtHwZak9m+CPHce6O0WkRI7boj9Yxuz3UTGT3Kg+3Sc68rXdjo29A5Y395 Jan 23 08:05:05 np0005593103 certmonger[41992]: Fy30LKNkVIhcBwNmo2C90BA4mNV+zsdghk/9g1PQtQma89trQWHrbObo2thYzC8b Jan 23 08:05:05 np0005593103 certmonger[41992]: nugbfK1t6qGgxVDFEQK6VX+csSzVT0EWpbkGnflFZlCah0f9mviCvwhO7pnjcveV Jan 23 08:05:05 np0005593103 certmonger[41992]: A1cSr0OvhoRSHwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:05 np0005593103 certmonger[41992]: ADIAMwAwADgAMAA1ADAANTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Jan 23 08:05:05 np0005593103 certmonger[41992]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:05 np0005593103 certmonger[41992]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fkci9ucDAwMDU1OTMxMDMu Jan 23 08:05:05 np0005593103 certmonger[41992]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Jan 23 08:05:05 np0005593103 certmonger[41992]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRyGyFucDAwMDU1OTMxMDMu Jan 23 08:05:05 np0005593103 certmonger[41992]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Jan 23 08:05:05 np0005593103 certmonger[41992]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFKbL6fBcyWaCNuPSVTpMo2J/gxfO Jan 23 08:05:05 np0005593103 certmonger[41992]: MA0GCSqGSIb3DQEBCwUAA4IBAQCXRUxNfIDgcZmh1NsS99uKmuQVGBEKU1bqAHNn Jan 23 08:05:05 np0005593103 certmonger[41992]: v9vdcB+0S5LuoQ9p3DVdiBU6bP6kWHoBWgT7DrEy9U82WxJc2SjE+Alqm1iYJrri Jan 23 08:05:05 np0005593103 certmonger[41992]: SzxZjG876kesfVg56xKFJHQ3rxcTT4/NLnUqZ5NWMKkrOqkVZPcYsjFzKdy8buYB Jan 23 08:05:05 np0005593103 certmonger[41992]: TzmeI/QK8YYIuE58E8BAI7Jduvn/yyHkn37kMbnUrhIO8gtN9g2wd9Wb1wXEQI2l Jan 23 08:05:05 np0005593103 certmonger[41992]: WD2ZA/KOke52nBjadQSOzl9MB5qT7NIIu2VPC18X0qm9rOlygkrBnBWDuFyVZGVV Jan 23 08:05:05 np0005593103 certmonger[41992]: 8R9CcK72uKHYKuIZ4thuesHdU2H0vxUzHWrNNmlXczWZ+zL/ Jan 23 08:05:05 np0005593103 certmonger[41992]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:05 np0005593103 certmonger[41992]: " for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv1YKlqtUftMlTpfvuolbeJi21gOBONw5C0YPY8IurQKEN8wktBKsIYGKLu3OR6XAcMGzQgDVEROmcUV0HqoZPIWen57zCXIU9xkED26lAfA11MlciXth7PedRUkZ9m5WqvnxOiZZhq6KNTYtHwZak9m+CPHce6O0WkRI7boj9Yxuz3UTGT3Kg+3Sc68rXdjo29A5Y395Fy30LKNkVIhcBwNmo2C90BA4mNV+zsdghk/9g1PQtQma89trQWHrbObo2thYzC8bnugbfK1t6qGgxVDFEQK6VX+csSzVT0EWpbkGnflFZlCah0f9mviCvwhO7pnjcveVA1cSr0OvhoRSHwIDAQAB" for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:05 np0005593103 certmonger[41992]: 2026-01-23 08:05:05 [41992] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[41992]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:05 np0005593103 certmonger[41992]: Certificate: "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" Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Certificate submission still ongoing. Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Certificate submission attempt complete. Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Child status = 0. Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Child output: Jan 23 08:05:05 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:05 np0005593103 certmonger[38997]: MIIFczCCA9ugAwIBAgIRAKevOU00cJ6YZ6yzZLv6THQwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:05 np0005593103 certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:05 np0005593103 certmonger[38997]: cml0eTAeFw0yNjAxMjMwODA1MDVaFw0yODAxMjQwODA1MDVaMD8xETAPBgNVBAoM Jan 23 08:05:05 np0005593103 certmonger[38997]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:05 np0005593103 certmonger[38997]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/VgqWq1R+0yVO Jan 23 08:05:05 np0005593103 certmonger[38997]: l++6iVt4mLbWA4E43DkLRg9jwi6tAoQ3zCS0EqwhgYou7c5HpcBwwbNCANURE6Zx Jan 23 08:05:05 np0005593103 certmonger[38997]: RXQeqhk8hZ6fnvMJchT3GQQPbqUB8DXUyVyJe2Hs951FSRn2blaq+fE6JlmGroo1 Jan 23 08:05:05 np0005593103 certmonger[38997]: Ni0fBlqT2b4I8dx7o7RaREjtuiP1jG7PdRMZPcqD7dJzrytd2Ojb0Dljf3kXLfQs Jan 23 08:05:05 np0005593103 certmonger[38997]: o2RUiFwHA2ajYL3QEDiY1X7Ox2CGT/2DU9C1CZrz22tBYets5uja2FjMLxue6Bt8 Jan 23 08:05:05 np0005593103 certmonger[38997]: rW3qoaDFUMURArpVf5yxLNVPQRaluQad+UVmUJqHR/2a+IK/CE7umeNy95UDVxKv Jan 23 08:05:05 np0005593103 certmonger[38997]: Q6+GhFIfAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:05 np0005593103 certmonger[38997]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593103 certmonger[38997]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:05 np0005593103 certmonger[38997]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593103 certmonger[38997]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:05 np0005593103 certmonger[38997]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSW Jan 23 08:05:05 np0005593103 certmonger[38997]: TYiY6oohAfmCDow9P9EZK8V+QTCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMu Jan 23 08:05:05 np0005593103 certmonger[38997]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk Jan 23 08:05:05 np0005593103 certmonger[38997]: ci9ucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:05 np0005593103 certmonger[38997]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy Jan 23 08:05:05 np0005593103 certmonger[38997]: GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:05 np0005593103 certmonger[38997]: BQADggGBAKpj31cKidvf2CmjI4iG2IKGiXFg9yPXvsBFcySlKFfMCYnX1DurMqnq Jan 23 08:05:05 np0005593103 certmonger[38997]: 8hIPhmbm01Tl1295X9B+cdopBS21Gv/g0Q/NMxbXfPgst5ZKbcTVhDN53jBDuaTC Jan 23 08:05:05 np0005593103 certmonger[38997]: PhdlYm0Z0vxXZhiBxNEygov0h/sDhHX/LHOYapRG7KxY7SNAdqlsNOOs4G0DYd3V Jan 23 08:05:05 np0005593103 certmonger[38997]: 9H8I2B0qLeD0AYwEYs96xogP90qVBhqu+yhye5IHcSZIOHXRDYXdQenk8nTS2FtD Jan 23 08:05:05 np0005593103 certmonger[38997]: Bho+5x7bGgyr7VxTQlUk5GRIYiKTqDbpSzrXfygmnWv5krsJLoJAFq8ocR7p4GRR Jan 23 08:05:05 np0005593103 certmonger[38997]: B6ffiXEfo85K949V2ODvyf6vOZ7yZdQnDSCrx7GgMMA3zX5kdWErnNBGPhdDGyiF Jan 23 08:05:05 np0005593103 certmonger[38997]: S8ohI/yaQpaOEUpvHKfcNOCYIMqlhtRvPm+4BufZDovZ2w+5CHIyu0Jr4iQg5Y1I Jan 23 08:05:05 np0005593103 certmonger[38997]: d74tZ/8pzovx+RhndhF2uhIN+WPKNNGy5OBZ88OJkApfmEazEqH6AG7zgOLeXn8b Jan 23 08:05:05 np0005593103 certmonger[38997]: sVCn0FPOZQ== Jan 23 08:05:05 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:05 np0005593103 certmonger[38997]: " Jan 23 08:05:05 np0005593103 certmonger[41994]: 2026-01-23 08:05:05 [41994] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:05 np0005593103 certmonger[41994]: MIIFczCCA9ugAwIBAgIRAKevOU00cJ6YZ6yzZLv6THQwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:05 np0005593103 certmonger[41994]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:05 np0005593103 certmonger[41994]: cml0eTAeFw0yNjAxMjMwODA1MDVaFw0yODAxMjQwODA1MDVaMD8xETAPBgNVBAoM Jan 23 08:05:05 np0005593103 certmonger[41994]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:05 np0005593103 certmonger[41994]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/VgqWq1R+0yVO Jan 23 08:05:05 np0005593103 certmonger[41994]: l++6iVt4mLbWA4E43DkLRg9jwi6tAoQ3zCS0EqwhgYou7c5HpcBwwbNCANURE6Zx Jan 23 08:05:05 np0005593103 certmonger[41994]: RXQeqhk8hZ6fnvMJchT3GQQPbqUB8DXUyVyJe2Hs951FSRn2blaq+fE6JlmGroo1 Jan 23 08:05:05 np0005593103 certmonger[41994]: Ni0fBlqT2b4I8dx7o7RaREjtuiP1jG7PdRMZPcqD7dJzrytd2Ojb0Dljf3kXLfQs Jan 23 08:05:05 np0005593103 certmonger[41994]: o2RUiFwHA2ajYL3QEDiY1X7Ox2CGT/2DU9C1CZrz22tBYets5uja2FjMLxue6Bt8 Jan 23 08:05:05 np0005593103 certmonger[41994]: rW3qoaDFUMURArpVf5yxLNVPQRaluQad+UVmUJqHR/2a+IK/CE7umeNy95UDVxKv Jan 23 08:05:05 np0005593103 certmonger[41994]: Q6+GhFIfAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:05 np0005593103 certmonger[41994]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593103 certmonger[41994]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:05 np0005593103 certmonger[41994]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593103 certmonger[41994]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:05 np0005593103 certmonger[41994]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSW Jan 23 08:05:05 np0005593103 certmonger[41994]: TYiY6oohAfmCDow9P9EZK8V+QTCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMu Jan 23 08:05:05 np0005593103 certmonger[41994]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk Jan 23 08:05:05 np0005593103 certmonger[41994]: ci9ucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:05 np0005593103 certmonger[41994]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy Jan 23 08:05:05 np0005593103 certmonger[41994]: GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:05 np0005593103 certmonger[41994]: BQADggGBAKpj31cKidvf2CmjI4iG2IKGiXFg9yPXvsBFcySlKFfMCYnX1DurMqnq Jan 23 08:05:05 np0005593103 certmonger[41994]: 8hIPhmbm01Tl1295X9B+cdopBS21Gv/g0Q/NMxbXfPgst5ZKbcTVhDN53jBDuaTC Jan 23 08:05:05 np0005593103 certmonger[41994]: PhdlYm0Z0vxXZhiBxNEygov0h/sDhHX/LHOYapRG7KxY7SNAdqlsNOOs4G0DYd3V Jan 23 08:05:05 np0005593103 certmonger[41994]: 9H8I2B0qLeD0AYwEYs96xogP90qVBhqu+yhye5IHcSZIOHXRDYXdQenk8nTS2FtD Jan 23 08:05:05 np0005593103 certmonger[41994]: Bho+5x7bGgyr7VxTQlUk5GRIYiKTqDbpSzrXfygmnWv5krsJLoJAFq8ocR7p4GRR Jan 23 08:05:05 np0005593103 certmonger[41994]: B6ffiXEfo85K949V2ODvyf6vOZ7yZdQnDSCrx7GgMMA3zX5kdWErnNBGPhdDGyiF Jan 23 08:05:05 np0005593103 certmonger[41994]: S8ohI/yaQpaOEUpvHKfcNOCYIMqlhtRvPm+4BufZDovZ2w+5CHIyu0Jr4iQg5Y1I Jan 23 08:05:05 np0005593103 certmonger[41994]: d74tZ/8pzovx+RhndhF2uhIN+WPKNNGy5OBZ88OJkApfmEazEqH6AG7zgOLeXn8b Jan 23 08:05:05 np0005593103 certmonger[41994]: sVCn0FPOZQ== Jan 23 08:05:05 np0005593103 certmonger[41994]: -----END CERTIFICATE----- Jan 23 08:05:05 np0005593103 certmonger[41994]: ". Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Certificate submission still ongoing. Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Certificate submission postprocessing complete. Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Child status = 0. Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Child output: Jan 23 08:05:05 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nsVCn0FPOZQ==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:05 np0005593103 certmonger[38997]: " Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:05 np0005593103 certmonger[38997]: MIIFczCCA9ugAwIBAgIRAKevOU00cJ6YZ6yzZLv6THQwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:05 np0005593103 certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:05 np0005593103 certmonger[38997]: cml0eTAeFw0yNjAxMjMwODA1MDVaFw0yODAxMjQwODA1MDVaMD8xETAPBgNVBAoM Jan 23 08:05:05 np0005593103 certmonger[38997]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:05 np0005593103 certmonger[38997]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/VgqWq1R+0yVO Jan 23 08:05:05 np0005593103 certmonger[38997]: l++6iVt4mLbWA4E43DkLRg9jwi6tAoQ3zCS0EqwhgYou7c5HpcBwwbNCANURE6Zx Jan 23 08:05:05 np0005593103 certmonger[38997]: RXQeqhk8hZ6fnvMJchT3GQQPbqUB8DXUyVyJe2Hs951FSRn2blaq+fE6JlmGroo1 Jan 23 08:05:05 np0005593103 certmonger[38997]: Ni0fBlqT2b4I8dx7o7RaREjtuiP1jG7PdRMZPcqD7dJzrytd2Ojb0Dljf3kXLfQs Jan 23 08:05:05 np0005593103 certmonger[38997]: o2RUiFwHA2ajYL3QEDiY1X7Ox2CGT/2DU9C1CZrz22tBYets5uja2FjMLxue6Bt8 Jan 23 08:05:05 np0005593103 certmonger[38997]: rW3qoaDFUMURArpVf5yxLNVPQRaluQad+UVmUJqHR/2a+IK/CE7umeNy95UDVxKv Jan 23 08:05:05 np0005593103 certmonger[38997]: Q6+GhFIfAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:05 np0005593103 certmonger[38997]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593103 certmonger[38997]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:05 np0005593103 certmonger[38997]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:05 np0005593103 certmonger[38997]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:05 np0005593103 certmonger[38997]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSW Jan 23 08:05:05 np0005593103 certmonger[38997]: TYiY6oohAfmCDow9P9EZK8V+QTCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMu Jan 23 08:05:05 np0005593103 certmonger[38997]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fk Jan 23 08:05:05 np0005593103 certmonger[38997]: ci9ucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:05 np0005593103 certmonger[38997]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRy Jan 23 08:05:05 np0005593103 certmonger[38997]: GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:05 np0005593103 certmonger[38997]: BQADggGBAKpj31cKidvf2CmjI4iG2IKGiXFg9yPXvsBFcySlKFfMCYnX1DurMqnq Jan 23 08:05:05 np0005593103 certmonger[38997]: 8hIPhmbm01Tl1295X9B+cdopBS21Gv/g0Q/NMxbXfPgst5ZKbcTVhDN53jBDuaTC Jan 23 08:05:05 np0005593103 certmonger[38997]: PhdlYm0Z0vxXZhiBxNEygov0h/sDhHX/LHOYapRG7KxY7SNAdqlsNOOs4G0DYd3V Jan 23 08:05:05 np0005593103 certmonger[38997]: 9H8I2B0qLeD0AYwEYs96xogP90qVBhqu+yhye5IHcSZIOHXRDYXdQenk8nTS2FtD Jan 23 08:05:05 np0005593103 certmonger[38997]: Bho+5x7bGgyr7VxTQlUk5GRIYiKTqDbpSzrXfygmnWv5krsJLoJAFq8ocR7p4GRR Jan 23 08:05:05 np0005593103 certmonger[38997]: B6ffiXEfo85K949V2ODvyf6vOZ7yZdQnDSCrx7GgMMA3zX5kdWErnNBGPhdDGyiF Jan 23 08:05:05 np0005593103 certmonger[38997]: S8ohI/yaQpaOEUpvHKfcNOCYIMqlhtRvPm+4BufZDovZ2w+5CHIyu0Jr4iQg5Y1I Jan 23 08:05:05 np0005593103 certmonger[38997]: d74tZ/8pzovx+RhndhF2uhIN+WPKNNGy5OBZ88OJkApfmEazEqH6AG7zgOLeXn8b Jan 23 08:05:05 np0005593103 certmonger[38997]: sVCn0FPOZQ== Jan 23 08:05:05 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:05 np0005593103 certmonger[38997]: ". Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] No hooks set for pre-save command. Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:05 np0005593103 certmonger[38997]: 2026-01-23 08:05:05 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:06 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:06 np0005593103 certmonger[38997]: 2026-01-23 08:05:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:06 np0005593103 certmonger[38997]: 2026-01-23 08:05:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:06 np0005593103 certmonger[42013]: Certificate in file "/etc/pki/tls/certs/metrics_qdr.crt" issued by CA and saved. Jan 23 08:05:06 np0005593103 certmonger[38997]: 2026-01-23 08:05:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080505 Jan 23 08:05:06 np0005593103 python3[42029]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:07 np0005593103 python3[42049]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:10 np0005593103 python3[42068]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:13 np0005593103 python3[42085]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:14 np0005593103 python3[42101]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:15 np0005593103 python3[42117]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:15 np0005593103 python3[42135]: ansible-certificate_request Invoked with name=mysql dns=['np0005593103.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['mysql/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Jan 23 08:05:15 np0005593103 certmonger[38997]: 2026-01-23 08:05:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:15 np0005593103 certmonger[38997]: 2026-01-23 08:05:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:15 np0005593103 certmonger[38997]: 2026-01-23 08:05:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:15 np0005593103 certmonger[38997]: 2026-01-23 08:05:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:15 np0005593103 certmonger[38997]: 2026-01-23 08:05:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:15 np0005593103 certmonger[38997]: 2026-01-23 08:05:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:15 np0005593103 certmonger[38997]: 2026-01-23 08:05:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:15 np0005593103 certmonger[38997]: 2026-01-23 08:05:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:15 np0005593103 certmonger[38997]: 2026-01-23 08:05:15 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:05:16 np0005593103 certmonger[42145]: overcloud.internalapi.ooo.test Jan 23 08:05:16 np0005593103 certmonger[42145]: " for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_REQ_PRINCIPAL" to "mysql/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:05:16 np0005593103 certmonger[42145]: " for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:16 np0005593103 certmonger[42145]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:05:16 np0005593103 certmonger[42145]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApLHgtxPC Jan 23 08:05:16 np0005593103 certmonger[42145]: D8IpR2tY1ys1dBMTzb4k/aKLM0gjp72iT8nV75L2o4DGvGuJuXcVxUPSovEayZLW Jan 23 08:05:16 np0005593103 certmonger[42145]: Ah75b6I0PGaK7Dzrj+ToUG+dBb0ZitxtOZ0BRc3O2E/VpC1NHeBeEBe0hQT6EJqg Jan 23 08:05:16 np0005593103 certmonger[42145]: HTRGHuOHNaxiYJDwIjKUmuwVV1INGAD1f1kme8gRklsZGCwBNehqyKgOFBIRazVa Jan 23 08:05:16 np0005593103 certmonger[42145]: f0wRFRq0LDswHldSjD26/Ao/8h/fAre4l1xm4iplRw1nSZTllbl81hR/Pa/88c9i Jan 23 08:05:16 np0005593103 certmonger[42145]: fmpwrx6Av7RVBCNNTKnPoYDOiY4AEJtPTKNDOi18lkJtv+GJ9+NPwnQ8SUL7sha8 Jan 23 08:05:16 np0005593103 certmonger[42145]: /g5B4Ukb1s8cUQIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:16 np0005593103 certmonger[42145]: ADIAMwAwADgAMAA1ADEANTCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Jan 23 08:05:16 np0005593103 certmonger[42145]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:16 np0005593103 certmonger[42145]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Jan 23 08:05:16 np0005593103 certmonger[42145]: FAIDoDIMMG15c3FsL25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBP Jan 23 08:05:16 np0005593103 certmonger[42145]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Jan 23 08:05:16 np0005593103 certmonger[42145]: bXlzcWwbIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Jan 23 08:05:16 np0005593103 certmonger[42145]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Jan 23 08:05:16 np0005593103 certmonger[42145]: psvp8FzJZoI249JVOkyjYn+DF84wDQYJKoZIhvcNAQELBQADggEBABk5lp3+xawm Jan 23 08:05:16 np0005593103 certmonger[42145]: +AfXBQfYE/oagrt/BZHESVTwIylkX2Jp9RjMzVt5P9Kv/Gqp9TTNWre3kgzrLK6n Jan 23 08:05:16 np0005593103 certmonger[42145]: rn3bNj1nrlZBuhoXMZHUQp9GEOFPo//nHnRhp/kOIb5T3tr8qPtVuw2YHd5JkOSO Jan 23 08:05:16 np0005593103 certmonger[42145]: rxDn+VD1T/Jo22WGuqjav7Zs1DkOYPrm3/JnMlx0YlwhTznRaQPYjPLUEi5IQqG7 Jan 23 08:05:16 np0005593103 certmonger[42145]: G+d1lmttOJRbC9FKVJdShZ+N4p51jbm4hwV35n00ZhWSGAkyQMnUpqSeXMW1cotU Jan 23 08:05:16 np0005593103 certmonger[42145]: 62H+s5FHD5rN/W3MUNt92+8jgofmpBrpjFcuKWcN+bHMLCXt2c983H3Y2Do7Yw8O Jan 23 08:05:16 np0005593103 certmonger[42145]: sD57DKzIncU= Jan 23 08:05:16 np0005593103 certmonger[42145]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:16 np0005593103 certmonger[42145]: " for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCkseC3E8IPwilHa1jXKzV0ExPNviT9ooszSCOnvaJPydXvkvajgMa8a4m5dxXFQ9Ki8RrJktYCHvlvojQ8ZorsPOuP5OhQb50FvRmK3G05nQFFzc7YT9WkLU0d4F4QF7SFBPoQmqAdNEYe44c1rGJgkPAiMpSa7BVXUg0YAPV/WSZ7yBGSWxkYLAE16GrIqA4UEhFrNVp/TBEVGrQsOzAeV1KMPbr8Cj/yH98Ct7iXXGbiKmVHDWdJlOWVuXzWFH89r/zxz2J+anCvHoC/tFUEI01Mqc+hgM6JjgAQm09Mo0M6LXyWQm2/4Yn340/CdDxJQvuyFrz+DkHhSRvWzxxRAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEALhbRDsjaehnR2Qs+obbHnjlDU5Y7vTr6ay7d6fyzkJIbh2IIBqRs7eRjZhXUAI+T4tVsw9Ajhf2UYiedZycpoYZLB/galNzHsJWhcd1Jkpsj4ivu4l8y17Ff/RIKw9MJRc2oH4SyyHFGc2i4ALnQIvcSAuL96gJgue4i5cr0iU5DXrVlupTVZvxzGGwOLl50s0z7txigb5KAXj+KADYDH2/rwAIDpWDfKKUWvMRZMy/pwwJr6azTP4ucRhYVHU+oxQ3wGwrknQMnDZZVjWQ2wlhOYMn+vaqPimRdipRpW73V4+2qNwI4mE8dVFwbFYJgEwScnd/G7Ap1N7i9ep8noA==" for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApLHgtxPCD8IpR2tY1ys1dBMTzb4k/aKLM0gjp72iT8nV75L2o4DGvGuJuXcVxUPSovEayZLWAh75b6I0PGaK7Dzrj+ToUG+dBb0ZitxtOZ0BRc3O2E/VpC1NHeBeEBe0hQT6EJqgHTRGHuOHNaxiYJDwIjKUmuwVV1INGAD1f1kme8gRklsZGCwBNehqyKgOFBIRazVaf0wRFRq0LDswHldSjD26/Ao/8h/fAre4l1xm4iplRw1nSZTllbl81hR/Pa/88c9ifmpwrx6Av7RVBCNNTKnPoYDOiY4AEJtPTKNDOi18lkJtv+GJ9+NPwnQ8SUL7sha8/g5B4Ukb1s8cUQIDAQAB" for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:16 np0005593103 certmonger[42145]: 2026-01-23 08:05:16 [42145] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[42145]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:16 np0005593103 certmonger[42145]: Certificate: "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" Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Certificate submission still ongoing. Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Certificate submission attempt complete. Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Child status = 0. Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Child output: Jan 23 08:05:16 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:16 np0005593103 certmonger[38997]: MIIFhjCCA+6gAwIBAgIQN+p/Dt3p8iGRji15WolU+DANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:16 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:16 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDUxNloXDTI4MDEyNDA4MDUxNlowPzERMA8GA1UECgwI Jan 23 08:05:16 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:16 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKSx4LcTwg/CKUdr Jan 23 08:05:16 np0005593103 certmonger[38997]: WNcrNXQTE82+JP2iizNII6e9ok/J1e+S9qOAxrxribl3FcVD0qLxGsmS1gIe+W+i Jan 23 08:05:16 np0005593103 certmonger[38997]: NDxmiuw864/k6FBvnQW9GYrcbTmdAUXNzthP1aQtTR3gXhAXtIUE+hCaoB00Rh7j Jan 23 08:05:16 np0005593103 certmonger[38997]: hzWsYmCQ8CIylJrsFVdSDRgA9X9ZJnvIEZJbGRgsATXoasioDhQSEWs1Wn9MERUa Jan 23 08:05:16 np0005593103 certmonger[38997]: tCw7MB5XUow9uvwKP/If3wK3uJdcZuIqZUcNZ0mU5ZW5fNYUfz2v/PHPYn5qcK8e Jan 23 08:05:16 np0005593103 certmonger[38997]: gL+0VQQjTUypz6GAzomOABCbT0yjQzotfJZCbb/hiffjT8J0PElC+7IWvP4OQeFJ Jan 23 08:05:16 np0005593103 certmonger[38997]: G9bPHFECAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:16 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:16 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:16 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:16 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:16 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFbD Jan 23 08:05:16 np0005593103 certmonger[38997]: m1y97mdK6yRTDxBDI1IDu5VHMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMy5p Jan 23 08:05:16 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Jan 23 08:05:16 np0005593103 certmonger[38997]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwbXlzcWwvbnAwMDA1NTkzMTAzLmludGVybmFs Jan 23 08:05:16 np0005593103 certmonger[38997]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Jan 23 08:05:16 np0005593103 certmonger[38997]: NTAzoAMCAQGhLDAqGwVteXNxbBshbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9v Jan 23 08:05:16 np0005593103 certmonger[38997]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA34HJkthkIina+MLP95oSBwHwriUjy Jan 23 08:05:16 np0005593103 certmonger[38997]: BKvljTIFSTbQkgScOk7D4tYaYPbVdfynwvw6Z3rxjAlUbbPYhexrQJUqqmrBd8bD Jan 23 08:05:16 np0005593103 certmonger[38997]: qeDVzvjd05vyhLD8836sKw3EZDAehzFj35mLZAxUyc40FNeSFF3y61/d2uOoILjr Jan 23 08:05:16 np0005593103 certmonger[38997]: GwxhkIS7n18c20D6x1BNnN2Dk9UrcKQ3mLTr5yYIvLUu2G/dIJ0O/nzy4RHgehNk Jan 23 08:05:16 np0005593103 certmonger[38997]: FryatDk8ZEgEOSpkkDa4NmeSB4HSL5F7giJhRAnt8g6/RgZPIx7nBip24y9XcRrG Jan 23 08:05:16 np0005593103 certmonger[38997]: qR8YQQ6LO6YFtKNzU9r7AdSh5RWcDhXNmVXpPfOFZCRB9rslGSTvcbvdxZYjrKPW Jan 23 08:05:16 np0005593103 certmonger[38997]: ezT7tzlBXDhz0SoAHU+GOftA6F0U6lZwmxtEfOEbsQDwp7YlFBkqEifUHrVjra1K Jan 23 08:05:16 np0005593103 certmonger[38997]: +4iWFEAhz47bpckYfNgeHNdZSn8Y21hkScldy3RXzk4a2BVrGJPFlEOEr+TIOMsu Jan 23 08:05:16 np0005593103 certmonger[38997]: dQeqQ86Ktx41HojEy7opEOIn6BnohbedBg4= Jan 23 08:05:16 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:16 np0005593103 certmonger[38997]: " Jan 23 08:05:16 np0005593103 certmonger[42147]: 2026-01-23 08:05:16 [42147] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:16 np0005593103 certmonger[42147]: MIIFhjCCA+6gAwIBAgIQN+p/Dt3p8iGRji15WolU+DANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:16 np0005593103 certmonger[42147]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:16 np0005593103 certmonger[42147]: aXR5MB4XDTI2MDEyMzA4MDUxNloXDTI4MDEyNDA4MDUxNlowPzERMA8GA1UECgwI Jan 23 08:05:16 np0005593103 certmonger[42147]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:16 np0005593103 certmonger[42147]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKSx4LcTwg/CKUdr Jan 23 08:05:16 np0005593103 certmonger[42147]: WNcrNXQTE82+JP2iizNII6e9ok/J1e+S9qOAxrxribl3FcVD0qLxGsmS1gIe+W+i Jan 23 08:05:16 np0005593103 certmonger[42147]: NDxmiuw864/k6FBvnQW9GYrcbTmdAUXNzthP1aQtTR3gXhAXtIUE+hCaoB00Rh7j Jan 23 08:05:16 np0005593103 certmonger[42147]: hzWsYmCQ8CIylJrsFVdSDRgA9X9ZJnvIEZJbGRgsATXoasioDhQSEWs1Wn9MERUa Jan 23 08:05:16 np0005593103 certmonger[42147]: tCw7MB5XUow9uvwKP/If3wK3uJdcZuIqZUcNZ0mU5ZW5fNYUfz2v/PHPYn5qcK8e Jan 23 08:05:16 np0005593103 certmonger[42147]: gL+0VQQjTUypz6GAzomOABCbT0yjQzotfJZCbb/hiffjT8J0PElC+7IWvP4OQeFJ Jan 23 08:05:16 np0005593103 certmonger[42147]: G9bPHFECAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:16 np0005593103 certmonger[42147]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:16 np0005593103 certmonger[42147]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:16 np0005593103 certmonger[42147]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:16 np0005593103 certmonger[42147]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:16 np0005593103 certmonger[42147]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFbD Jan 23 08:05:16 np0005593103 certmonger[42147]: m1y97mdK6yRTDxBDI1IDu5VHMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMy5p Jan 23 08:05:16 np0005593103 certmonger[42147]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Jan 23 08:05:16 np0005593103 certmonger[42147]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwbXlzcWwvbnAwMDA1NTkzMTAzLmludGVybmFs Jan 23 08:05:16 np0005593103 certmonger[42147]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Jan 23 08:05:16 np0005593103 certmonger[42147]: NTAzoAMCAQGhLDAqGwVteXNxbBshbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9v Jan 23 08:05:16 np0005593103 certmonger[42147]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA34HJkthkIina+MLP95oSBwHwriUjy Jan 23 08:05:16 np0005593103 certmonger[42147]: BKvljTIFSTbQkgScOk7D4tYaYPbVdfynwvw6Z3rxjAlUbbPYhexrQJUqqmrBd8bD Jan 23 08:05:16 np0005593103 certmonger[42147]: qeDVzvjd05vyhLD8836sKw3EZDAehzFj35mLZAxUyc40FNeSFF3y61/d2uOoILjr Jan 23 08:05:16 np0005593103 certmonger[42147]: GwxhkIS7n18c20D6x1BNnN2Dk9UrcKQ3mLTr5yYIvLUu2G/dIJ0O/nzy4RHgehNk Jan 23 08:05:16 np0005593103 certmonger[42147]: FryatDk8ZEgEOSpkkDa4NmeSB4HSL5F7giJhRAnt8g6/RgZPIx7nBip24y9XcRrG Jan 23 08:05:16 np0005593103 certmonger[42147]: qR8YQQ6LO6YFtKNzU9r7AdSh5RWcDhXNmVXpPfOFZCRB9rslGSTvcbvdxZYjrKPW Jan 23 08:05:16 np0005593103 certmonger[42147]: ezT7tzlBXDhz0SoAHU+GOftA6F0U6lZwmxtEfOEbsQDwp7YlFBkqEifUHrVjra1K Jan 23 08:05:16 np0005593103 certmonger[42147]: +4iWFEAhz47bpckYfNgeHNdZSn8Y21hkScldy3RXzk4a2BVrGJPFlEOEr+TIOMsu Jan 23 08:05:16 np0005593103 certmonger[42147]: dQeqQ86Ktx41HojEy7opEOIn6BnohbedBg4= Jan 23 08:05:16 np0005593103 certmonger[42147]: -----END CERTIFICATE----- Jan 23 08:05:16 np0005593103 certmonger[42147]: ". Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Certificate submission still ongoing. Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Certificate submission postprocessing complete. Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Child status = 0. Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Child output: Jan 23 08:05:16 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ndQeqQ86Ktx41HojEy7opEOIn6BnohbedBg4=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:16 np0005593103 certmonger[38997]: " Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:16 np0005593103 certmonger[38997]: MIIFhjCCA+6gAwIBAgIQN+p/Dt3p8iGRji15WolU+DANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:16 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:16 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDUxNloXDTI4MDEyNDA4MDUxNlowPzERMA8GA1UECgwI Jan 23 08:05:16 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:16 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKSx4LcTwg/CKUdr Jan 23 08:05:16 np0005593103 certmonger[38997]: WNcrNXQTE82+JP2iizNII6e9ok/J1e+S9qOAxrxribl3FcVD0qLxGsmS1gIe+W+i Jan 23 08:05:16 np0005593103 certmonger[38997]: NDxmiuw864/k6FBvnQW9GYrcbTmdAUXNzthP1aQtTR3gXhAXtIUE+hCaoB00Rh7j Jan 23 08:05:16 np0005593103 certmonger[38997]: hzWsYmCQ8CIylJrsFVdSDRgA9X9ZJnvIEZJbGRgsATXoasioDhQSEWs1Wn9MERUa Jan 23 08:05:16 np0005593103 certmonger[38997]: tCw7MB5XUow9uvwKP/If3wK3uJdcZuIqZUcNZ0mU5ZW5fNYUfz2v/PHPYn5qcK8e Jan 23 08:05:16 np0005593103 certmonger[38997]: gL+0VQQjTUypz6GAzomOABCbT0yjQzotfJZCbb/hiffjT8J0PElC+7IWvP4OQeFJ Jan 23 08:05:16 np0005593103 certmonger[38997]: G9bPHFECAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:16 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:16 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:16 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:16 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:16 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFbD Jan 23 08:05:16 np0005593103 certmonger[38997]: m1y97mdK6yRTDxBDI1IDu5VHMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMy5p Jan 23 08:05:16 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Jan 23 08:05:16 np0005593103 certmonger[38997]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwbXlzcWwvbnAwMDA1NTkzMTAzLmludGVybmFs Jan 23 08:05:16 np0005593103 certmonger[38997]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Jan 23 08:05:16 np0005593103 certmonger[38997]: NTAzoAMCAQGhLDAqGwVteXNxbBshbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9v Jan 23 08:05:16 np0005593103 certmonger[38997]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA34HJkthkIina+MLP95oSBwHwriUjy Jan 23 08:05:16 np0005593103 certmonger[38997]: BKvljTIFSTbQkgScOk7D4tYaYPbVdfynwvw6Z3rxjAlUbbPYhexrQJUqqmrBd8bD Jan 23 08:05:16 np0005593103 certmonger[38997]: qeDVzvjd05vyhLD8836sKw3EZDAehzFj35mLZAxUyc40FNeSFF3y61/d2uOoILjr Jan 23 08:05:16 np0005593103 certmonger[38997]: GwxhkIS7n18c20D6x1BNnN2Dk9UrcKQ3mLTr5yYIvLUu2G/dIJ0O/nzy4RHgehNk Jan 23 08:05:16 np0005593103 certmonger[38997]: FryatDk8ZEgEOSpkkDa4NmeSB4HSL5F7giJhRAnt8g6/RgZPIx7nBip24y9XcRrG Jan 23 08:05:16 np0005593103 certmonger[38997]: qR8YQQ6LO6YFtKNzU9r7AdSh5RWcDhXNmVXpPfOFZCRB9rslGSTvcbvdxZYjrKPW Jan 23 08:05:16 np0005593103 certmonger[38997]: ezT7tzlBXDhz0SoAHU+GOftA6F0U6lZwmxtEfOEbsQDwp7YlFBkqEifUHrVjra1K Jan 23 08:05:16 np0005593103 certmonger[38997]: +4iWFEAhz47bpckYfNgeHNdZSn8Y21hkScldy3RXzk4a2BVrGJPFlEOEr+TIOMsu Jan 23 08:05:16 np0005593103 certmonger[38997]: dQeqQ86Ktx41HojEy7opEOIn6BnohbedBg4= Jan 23 08:05:16 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:16 np0005593103 certmonger[38997]: ". Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] No hooks set for pre-save command. Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] No hooks set for post-save command. Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:16 np0005593103 certmonger[42151]: Certificate in file "/etc/pki/tls/certs/mysql.crt" issued by CA and saved. Jan 23 08:05:16 np0005593103 certmonger[38997]: 2026-01-23 08:05:16 [38997] Wrote to /var/lib/certmonger/requests/20260123080515 Jan 23 08:05:17 np0005593103 python3[42167]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:05:24 np0005593103 podman[42168]: 2026-01-23 08:05:17.399066269 +0000 UTC m=+0.045523085 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 08:05:24 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:25 np0005593103 python3[42234]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 cluster.common.tag/mariadb:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:05:25 np0005593103 podman[42235]: 2026-01-23 08:05:25.139604359 +0000 UTC m=+0.053000037 image tag b13c44df76d5b3bb87652b20507cc40d62568630b0249319c13c07bbb18c36c3 cluster.common.tag/mariadb:pcmklatest Jan 23 08:05:25 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:25 np0005593103 python3[42262]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:26 np0005593103 python3[42282]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:29 np0005593103 python3[42299]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:33 np0005593103 python3[42316]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:33 np0005593103 python3[42332]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:34 np0005593103 python3[42348]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:35 np0005593103 python3[42366]: ansible-certificate_request Invoked with name=neutron_ovn dns=['np0005593103.internalapi.ooo.test'] principal=['neutron_ovn/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:05:35 np0005593103 certmonger[42376]: " for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_REQ_PRINCIPAL" to "neutron_ovn/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:05:35 np0005593103 certmonger[42376]: " for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:35 np0005593103 certmonger[42376]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:05:35 np0005593103 certmonger[42376]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAogRyeRZs Jan 23 08:05:35 np0005593103 certmonger[42376]: gEAXtGdeW+GiWlPd5ff0836CnciK4qEXDGeYGWQiTk8B0Eiabk05uxTGaQT8sfeG Jan 23 08:05:35 np0005593103 certmonger[42376]: X8wX2EbGGxUOO4L40YpVscOZZRuOA+HWv6d/MevbPBS3YEXBlARU338Lh/NTzVsl Jan 23 08:05:35 np0005593103 certmonger[42376]: 3WfyztVRHzem+1kRnPjEvgtVkFF/fd7zNmemLo/7V3+Er8dD7Il6SRBJNBx+AFa5 Jan 23 08:05:35 np0005593103 certmonger[42376]: BiLIXSuhBbU7+yTLeaMB9BmAXQNp1y3d99PIlG57K4s2CXPAZ4BIDlmnCNzVVVAJ Jan 23 08:05:35 np0005593103 certmonger[42376]: Z1Nx+boyGpQkcg8Hr0kZLEPZElWyW/atGzAlahKXy0CU8AonSSHif838HTORBQIu Jan 23 08:05:35 np0005593103 certmonger[42376]: FbYdlwt+0Fv3pQIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:35 np0005593103 certmonger[42376]: ADIAMwAwADgAMAA1ADMANTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Jan 23 08:05:35 np0005593103 certmonger[42376]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:35 np0005593103 certmonger[42376]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292bi9ucDAwMDU1OTMxMDMu Jan 23 08:05:35 np0005593103 certmonger[42376]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Jan 23 08:05:35 np0005593103 certmonger[42376]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3ZuGyFucDAwMDU1OTMxMDMu Jan 23 08:05:35 np0005593103 certmonger[42376]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Jan 23 08:05:35 np0005593103 certmonger[42376]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFKbL6fBcyWaCNuPSVTpMo2J/gxfO Jan 23 08:05:35 np0005593103 certmonger[42376]: MA0GCSqGSIb3DQEBCwUAA4IBAQALJn5be6mmJEM6q5JPAEqLufQvJd3ea5neY3qX Jan 23 08:05:35 np0005593103 certmonger[42376]: vcJVAyLbZVIzgEBLhVou1gZgVAwlUau6xsaNjNkhlaSNwGw0sH7JfCSv9bbhEycx Jan 23 08:05:35 np0005593103 certmonger[42376]: AOeEbDasJDlJc7xsq0PYyyoIpMJYBqAiIhLqMhrKGla5AgpQ3lqBjncaSCg34YLO Jan 23 08:05:35 np0005593103 certmonger[42376]: WR3vHYJulHAx39xdegzn+IL2ze2wB0XIxu4/Yi/mDUI4E95VPlnB4aCs0Fex77b+ Jan 23 08:05:35 np0005593103 certmonger[42376]: +Nu5xWsr5/ofhLxgptro80vlQt+NkM/6zA/+J9GjsLYCzcQ4dwkalKChvJi6+Z46 Jan 23 08:05:35 np0005593103 certmonger[42376]: f+rH8AW3NxxLE5pgZjx7C+4kAogcW7X8ZRbTU9YiLIjpRDOb Jan 23 08:05:35 np0005593103 certmonger[42376]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:35 np0005593103 certmonger[42376]: " for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAogRyeRZsgEAXtGdeW+GiWlPd5ff0836CnciK4qEXDGeYGWQiTk8B0Eiabk05uxTGaQT8sfeGX8wX2EbGGxUOO4L40YpVscOZZRuOA+HWv6d/MevbPBS3YEXBlARU338Lh/NTzVsl3WfyztVRHzem+1kRnPjEvgtVkFF/fd7zNmemLo/7V3+Er8dD7Il6SRBJNBx+AFa5BiLIXSuhBbU7+yTLeaMB9BmAXQNp1y3d99PIlG57K4s2CXPAZ4BIDlmnCNzVVVAJZ1Nx+boyGpQkcg8Hr0kZLEPZElWyW/atGzAlahKXy0CU8AonSSHif838HTORBQIuFbYdlwt+0Fv3pQIDAQAB" for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:35 np0005593103 certmonger[42376]: 2026-01-23 08:05:35 [42376] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:35 np0005593103 certmonger[38997]: 2026-01-23 08:05:35 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:35 np0005593103 certmonger[42376]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:36 np0005593103 certmonger[42376]: Certificate: "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" Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Certificate submission still ongoing. Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Certificate submission attempt complete. Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Child status = 0. Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Child output: Jan 23 08:05:36 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:36 np0005593103 certmonger[38997]: MIIFczCCA9ugAwIBAgIRAMyg58jiR2mpPX660TVYyBgwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:36 np0005593103 certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:36 np0005593103 certmonger[38997]: cml0eTAeFw0yNjAxMjMwODA1MzVaFw0yODAxMjQwODA1MzVaMD8xETAPBgNVBAoM Jan 23 08:05:36 np0005593103 certmonger[38997]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:36 np0005593103 certmonger[38997]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCiBHJ5FmyAQBe0 Jan 23 08:05:36 np0005593103 certmonger[38997]: Z15b4aJaU93l9/TzfoKdyIrioRcMZ5gZZCJOTwHQSJpuTTm7FMZpBPyx94ZfzBfY Jan 23 08:05:36 np0005593103 certmonger[38997]: RsYbFQ47gvjRilWxw5llG44D4da/p38x69s8FLdgRcGUBFTffwuH81PNWyXdZ/LO Jan 23 08:05:36 np0005593103 certmonger[38997]: 1VEfN6b7WRGc+MS+C1WQUX993vM2Z6Yuj/tXf4Svx0PsiXpJEEk0HH4AVrkGIshd Jan 23 08:05:36 np0005593103 certmonger[38997]: K6EFtTv7JMt5owH0GYBdA2nXLd3308iUbnsrizYJc8BngEgOWacI3NVVUAlnU3H5 Jan 23 08:05:36 np0005593103 certmonger[38997]: ujIalCRyDwevSRksQ9kSVbJb9q0bMCVqEpfLQJTwCidJIeJ/zfwdM5EFAi4Vth2X Jan 23 08:05:36 np0005593103 certmonger[38997]: C37QW/elAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:36 np0005593103 certmonger[38997]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:36 np0005593103 certmonger[38997]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:36 np0005593103 certmonger[38997]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:36 np0005593103 certmonger[38997]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:36 np0005593103 certmonger[38997]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSw Jan 23 08:05:36 np0005593103 certmonger[38997]: E/Krr6aawIzApJv92CjxcAWJDDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMu Jan 23 08:05:36 np0005593103 certmonger[38997]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292 Jan 23 08:05:36 np0005593103 certmonger[38997]: bi9ucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:36 np0005593103 certmonger[38997]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3Zu Jan 23 08:05:36 np0005593103 certmonger[38997]: GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:36 np0005593103 certmonger[38997]: BQADggGBAA8ZE8GjK0E6g2BfaLkO5F9k9Wfjs+mf5NVNumpl/oiobTv/uXVPvCWR Jan 23 08:05:36 np0005593103 certmonger[38997]: iNTeXRe6O+InnPcUNk2yqTaiki61PR4RYzGhlorsbXjMFsFqjneN+X9xcviFJWGF Jan 23 08:05:36 np0005593103 certmonger[38997]: JsNBsd7L3jb25zsQT6kd4jJxMdakzh7H6SKFs1UJ6Upqch57A2+xJUJfkasMxvP7 Jan 23 08:05:36 np0005593103 certmonger[38997]: KhUbVBjUi3EuIWtkZdA8hCNKifPqFIjLBCzuWN1EVQG/3wDHOo+t6ShLcuDLXzU7 Jan 23 08:05:36 np0005593103 certmonger[38997]: 5Qg/pjYp9XdVYd5lp+z1SOpFrLejf/XOo/umvUQHuiB3H1a+Moj/DPygEh3DLbUW Jan 23 08:05:36 np0005593103 certmonger[38997]: 70e7Thvnj1obsO6n2NVklycAXl5/GW6tpCOvZBP+7u4OorQCmpk7n9G4GJaCfUII Jan 23 08:05:36 np0005593103 certmonger[38997]: LM3x/+DWGnPhuEaD64tV+/vwJNUFLgwaSEgc5nRwGa23v9XH3GIif9zDr3CBdcoS Jan 23 08:05:36 np0005593103 certmonger[38997]: 0jgpbcysE3bsh97zWMo/G+JIgY/p5Y+BtMDv3xZD86QXvZJqfM0oERU0UQ2ViUEE Jan 23 08:05:36 np0005593103 certmonger[38997]: sLURS/uRpw== Jan 23 08:05:36 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:36 np0005593103 certmonger[38997]: " Jan 23 08:05:36 np0005593103 certmonger[42378]: 2026-01-23 08:05:36 [42378] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:36 np0005593103 certmonger[42378]: MIIFczCCA9ugAwIBAgIRAMyg58jiR2mpPX660TVYyBgwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:36 np0005593103 certmonger[42378]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:36 np0005593103 certmonger[42378]: cml0eTAeFw0yNjAxMjMwODA1MzVaFw0yODAxMjQwODA1MzVaMD8xETAPBgNVBAoM Jan 23 08:05:36 np0005593103 certmonger[42378]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:36 np0005593103 certmonger[42378]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCiBHJ5FmyAQBe0 Jan 23 08:05:36 np0005593103 certmonger[42378]: Z15b4aJaU93l9/TzfoKdyIrioRcMZ5gZZCJOTwHQSJpuTTm7FMZpBPyx94ZfzBfY Jan 23 08:05:36 np0005593103 certmonger[42378]: RsYbFQ47gvjRilWxw5llG44D4da/p38x69s8FLdgRcGUBFTffwuH81PNWyXdZ/LO Jan 23 08:05:36 np0005593103 certmonger[42378]: 1VEfN6b7WRGc+MS+C1WQUX993vM2Z6Yuj/tXf4Svx0PsiXpJEEk0HH4AVrkGIshd Jan 23 08:05:36 np0005593103 certmonger[42378]: K6EFtTv7JMt5owH0GYBdA2nXLd3308iUbnsrizYJc8BngEgOWacI3NVVUAlnU3H5 Jan 23 08:05:36 np0005593103 certmonger[42378]: ujIalCRyDwevSRksQ9kSVbJb9q0bMCVqEpfLQJTwCidJIeJ/zfwdM5EFAi4Vth2X Jan 23 08:05:36 np0005593103 certmonger[42378]: C37QW/elAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:36 np0005593103 certmonger[42378]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:36 np0005593103 certmonger[42378]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:36 np0005593103 certmonger[42378]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:36 np0005593103 certmonger[42378]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:36 np0005593103 certmonger[42378]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSw Jan 23 08:05:36 np0005593103 certmonger[42378]: E/Krr6aawIzApJv92CjxcAWJDDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMu Jan 23 08:05:36 np0005593103 certmonger[42378]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292 Jan 23 08:05:36 np0005593103 certmonger[42378]: bi9ucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:36 np0005593103 certmonger[42378]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3Zu Jan 23 08:05:36 np0005593103 certmonger[42378]: GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:36 np0005593103 certmonger[42378]: BQADggGBAA8ZE8GjK0E6g2BfaLkO5F9k9Wfjs+mf5NVNumpl/oiobTv/uXVPvCWR Jan 23 08:05:36 np0005593103 certmonger[42378]: iNTeXRe6O+InnPcUNk2yqTaiki61PR4RYzGhlorsbXjMFsFqjneN+X9xcviFJWGF Jan 23 08:05:36 np0005593103 certmonger[42378]: JsNBsd7L3jb25zsQT6kd4jJxMdakzh7H6SKFs1UJ6Upqch57A2+xJUJfkasMxvP7 Jan 23 08:05:36 np0005593103 certmonger[42378]: KhUbVBjUi3EuIWtkZdA8hCNKifPqFIjLBCzuWN1EVQG/3wDHOo+t6ShLcuDLXzU7 Jan 23 08:05:36 np0005593103 certmonger[42378]: 5Qg/pjYp9XdVYd5lp+z1SOpFrLejf/XOo/umvUQHuiB3H1a+Moj/DPygEh3DLbUW Jan 23 08:05:36 np0005593103 certmonger[42378]: 70e7Thvnj1obsO6n2NVklycAXl5/GW6tpCOvZBP+7u4OorQCmpk7n9G4GJaCfUII Jan 23 08:05:36 np0005593103 certmonger[42378]: LM3x/+DWGnPhuEaD64tV+/vwJNUFLgwaSEgc5nRwGa23v9XH3GIif9zDr3CBdcoS Jan 23 08:05:36 np0005593103 certmonger[42378]: 0jgpbcysE3bsh97zWMo/G+JIgY/p5Y+BtMDv3xZD86QXvZJqfM0oERU0UQ2ViUEE Jan 23 08:05:36 np0005593103 certmonger[42378]: sLURS/uRpw== Jan 23 08:05:36 np0005593103 certmonger[42378]: -----END CERTIFICATE----- Jan 23 08:05:36 np0005593103 certmonger[42378]: ". Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Certificate submission still ongoing. Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Certificate submission postprocessing complete. Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Child status = 0. Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Child output: Jan 23 08:05:36 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFczCCA9ugAwIBAgIRAMyg58jiR2mpPX660TVYyBgwDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAxMjMwODA1MzVaFw0yODAxMjQwODA1MzVaMD8xETAPBgNVBAoM\nCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v\nLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCiBHJ5FmyAQBe0\nZ15b4aJaU93l9/TzfoKdyIrioRcMZ5gZZCJOTwHQSJpuTTm7FMZpBPyx94ZfzBfY\nRsYbFQ47gvjRilWxw5llG44D4da/p38x69s8FLdgRcGUBFTffwuH81PNWyXdZ/LO\n1VEfN6b7WRGc+MS+C1WQUX993vM2Z6Yuj/tXf4Svx0PsiXpJEEk0HH4AVrkGIshd\nK6EFtTv7JMt5owH0GYBdA2nXLd3308iUbnsrizYJc8BngEgOWacI3NVVUAlnU3H5\nujIalCRyDwevSRksQ9kSVbJb9q0bMCVqEpfLQJTwCidJIeJ/zfwdM5EFAi4Vth2X\nC37QW/elAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt\ndyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB\nBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp\ncGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSw\nE/Krr6aawIzApJv92CjxcAWJDDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMu\naW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292\nbi9ucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG\nKwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3Zu\nGyFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL\nBQADggGBAA8ZE8GjK0E6g2BfaLkO5F9k9Wfjs+mf5NVNumpl/oiobTv/uXVPvCWR\niNTeXRe6O+InnPcUNk2yqTaiki61PR4RYzGhlorsbXjMFsFqjneN+X9xcviFJWGF\nJsNBsd7L3jb25zsQT6kd4jJxMdakzh7H6SKFs1UJ6Upqch57A2+xJUJfkasMxvP7\nKhUbVBjUi3EuIWtkZdA8hCNKifPqFIjLBCzuWN1EVQG/3wDHOo+t6ShLcuDLXzU7\n5Qg/pjYp9XdVYd5lp+z1SOpFrLejf/XOo/umvUQHuiB3H1a+Moj/DPygEh3DLbUW\n70e7Thvnj1obsO6n2NVklycAXl5/GW6tpCOvZBP+7u4OorQCmpk7n9G4GJaCfUII\nLM3x/+DWGnPhuEaD64tV+/vwJNUFLgwaSEgc5nRwGa23v9XH3GIif9zDr3CBdcoS\n0jgpbcysE3bsh97zWMo/G+JIgY/p5Y+BtMDv3xZD86QXvZJqfM0oERU0UQ2ViUEE\nsLURS/uRpw==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:36 np0005593103 certmonger[38997]: " Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:36 np0005593103 certmonger[38997]: MIIFczCCA9ugAwIBAgIRAMyg58jiR2mpPX660TVYyBgwDQYJKoZIhvcNAQELBQAw Jan 23 08:05:36 np0005593103 certmonger[38997]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 08:05:36 np0005593103 certmonger[38997]: cml0eTAeFw0yNjAxMjMwODA1MzVaFw0yODAxMjQwODA1MzVaMD8xETAPBgNVBAoM Jan 23 08:05:36 np0005593103 certmonger[38997]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:36 np0005593103 certmonger[38997]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCiBHJ5FmyAQBe0 Jan 23 08:05:36 np0005593103 certmonger[38997]: Z15b4aJaU93l9/TzfoKdyIrioRcMZ5gZZCJOTwHQSJpuTTm7FMZpBPyx94ZfzBfY Jan 23 08:05:36 np0005593103 certmonger[38997]: RsYbFQ47gvjRilWxw5llG44D4da/p38x69s8FLdgRcGUBFTffwuH81PNWyXdZ/LO Jan 23 08:05:36 np0005593103 certmonger[38997]: 1VEfN6b7WRGc+MS+C1WQUX993vM2Z6Yuj/tXf4Svx0PsiXpJEEk0HH4AVrkGIshd Jan 23 08:05:36 np0005593103 certmonger[38997]: K6EFtTv7JMt5owH0GYBdA2nXLd3308iUbnsrizYJc8BngEgOWacI3NVVUAlnU3H5 Jan 23 08:05:36 np0005593103 certmonger[38997]: ujIalCRyDwevSRksQ9kSVbJb9q0bMCVqEpfLQJTwCidJIeJ/zfwdM5EFAi4Vth2X Jan 23 08:05:36 np0005593103 certmonger[38997]: C37QW/elAgMBAAGjggH0MIIB8DAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 08:05:36 np0005593103 certmonger[38997]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:36 np0005593103 certmonger[38997]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 08:05:36 np0005593103 certmonger[38997]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 08:05:36 np0005593103 certmonger[38997]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 08:05:36 np0005593103 certmonger[38997]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBSw Jan 23 08:05:36 np0005593103 certmonger[38997]: E/Krr6aawIzApJv92CjxcAWJDDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMu Jan 23 08:05:36 np0005593103 certmonger[38997]: aW50ZXJuYWxhcGkub29vLnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292 Jan 23 08:05:36 np0005593103 certmonger[38997]: bi9ucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYG Jan 23 08:05:36 np0005593103 certmonger[38997]: KwYBBQICoEswSaAKGwhPT08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3Zu Jan 23 08:05:36 np0005593103 certmonger[38997]: GyFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQEL Jan 23 08:05:36 np0005593103 certmonger[38997]: BQADggGBAA8ZE8GjK0E6g2BfaLkO5F9k9Wfjs+mf5NVNumpl/oiobTv/uXVPvCWR Jan 23 08:05:36 np0005593103 certmonger[38997]: iNTeXRe6O+InnPcUNk2yqTaiki61PR4RYzGhlorsbXjMFsFqjneN+X9xcviFJWGF Jan 23 08:05:36 np0005593103 certmonger[38997]: JsNBsd7L3jb25zsQT6kd4jJxMdakzh7H6SKFs1UJ6Upqch57A2+xJUJfkasMxvP7 Jan 23 08:05:36 np0005593103 certmonger[38997]: KhUbVBjUi3EuIWtkZdA8hCNKifPqFIjLBCzuWN1EVQG/3wDHOo+t6ShLcuDLXzU7 Jan 23 08:05:36 np0005593103 certmonger[38997]: 5Qg/pjYp9XdVYd5lp+z1SOpFrLejf/XOo/umvUQHuiB3H1a+Moj/DPygEh3DLbUW Jan 23 08:05:36 np0005593103 certmonger[38997]: 70e7Thvnj1obsO6n2NVklycAXl5/GW6tpCOvZBP+7u4OorQCmpk7n9G4GJaCfUII Jan 23 08:05:36 np0005593103 certmonger[38997]: LM3x/+DWGnPhuEaD64tV+/vwJNUFLgwaSEgc5nRwGa23v9XH3GIif9zDr3CBdcoS Jan 23 08:05:36 np0005593103 certmonger[38997]: 0jgpbcysE3bsh97zWMo/G+JIgY/p5Y+BtMDv3xZD86QXvZJqfM0oERU0UQ2ViUEE Jan 23 08:05:36 np0005593103 certmonger[38997]: sLURS/uRpw== Jan 23 08:05:36 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:36 np0005593103 certmonger[38997]: ". Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] No hooks set for pre-save command. Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] No hooks set for post-save command. Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 certmonger[42382]: Certificate in file "/etc/pki/tls/certs/neutron_ovn.crt" issued by CA and saved. Jan 23 08:05:36 np0005593103 certmonger[38997]: 2026-01-23 08:05:36 [38997] Wrote to /var/lib/certmonger/requests/20260123080535 Jan 23 08:05:36 np0005593103 python3[42398]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:37 np0005593103 python3[42418]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:40 np0005593103 python3[42435]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:43 np0005593103 python3[42452]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:43 np0005593103 python3[42468]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:44 np0005593103 python3[42484]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:45 np0005593103 python3[42502]: ansible-certificate_request Invoked with name=libvirt-vnc-client-cert dns=['np0005593103.internalapi.ooo.test'] principal=['libvirt-vnc/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/libvirt-vnc-client-cert.crt"#012service_key="/etc/pki/tls/private/libvirt-vnc-client-cert.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:05:45 np0005593103 certmonger[42512]: " for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_REQ_PRINCIPAL" to "libvirt-vnc/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:05:45 np0005593103 certmonger[42512]: " for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:45 np0005593103 certmonger[42512]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:05:45 np0005593103 certmonger[42512]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4RfL/Wz4 Jan 23 08:05:45 np0005593103 certmonger[42512]: hhLPg4LzadZ6vPLkKFWykbuER0KdPicv8byZsD0ulXya9RvvZ4ztlxRTDWziXX8S Jan 23 08:05:45 np0005593103 certmonger[42512]: BE5fFFnpSsbYmLwWQEDJaSD1L3hcpf+AWlpzA2KIPcE+0Co7UHeCt7zEtNFBirfp Jan 23 08:05:45 np0005593103 certmonger[42512]: MFZ5TIfKdt/KEXERQ9QF9/vDFjKkZM3V6026hqTDYH8ZwTHRW40X5Z5T7Fl3wlY+ Jan 23 08:05:45 np0005593103 certmonger[42512]: wTJsjDZz32Dy2oLy0D/ASjKJhaXtdymA18No7ULf0V/Ks83Lug8cr7/C2A/n8Jdy Jan 23 08:05:45 np0005593103 certmonger[42512]: e1YoPx3iwOqwrciGAPvDHoOU0nYtz4fMWYhnW/b4bvRk1R4cJh/B1unqmfguTBss Jan 23 08:05:45 np0005593103 certmonger[42512]: GBTI8zA47QlJNwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:45 np0005593103 certmonger[42512]: ADIAMwAwADgAMAA1ADQANTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Jan 23 08:05:45 np0005593103 certmonger[42512]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:45 np0005593103 certmonger[42512]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZuYy9ucDAwMDU1OTMxMDMu Jan 23 08:05:45 np0005593103 certmonger[42512]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Jan 23 08:05:45 np0005593103 certmonger[42512]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5jGyFucDAwMDU1OTMxMDMu Jan 23 08:05:45 np0005593103 certmonger[42512]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Jan 23 08:05:45 np0005593103 certmonger[42512]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFKbL6fBcyWaCNuPSVTpMo2J/gxfO Jan 23 08:05:45 np0005593103 certmonger[42512]: MA0GCSqGSIb3DQEBCwUAA4IBAQDatFRpBCpFgZyjQvdXyAftjAIueTl6BqT1OO5U Jan 23 08:05:45 np0005593103 certmonger[42512]: amfO5IuXL3xCqzb8bP/MnuQi/GA1lxwVuQDe4tQHDNJ0+p4CIcVbn3Yquyd7Tt3z Jan 23 08:05:45 np0005593103 certmonger[42512]: jdquOFEMAcpySoaIFEUl831xhMtOJnEY2702UrSip76mf8sLKlJj8T5gt1dZd5ci Jan 23 08:05:45 np0005593103 certmonger[42512]: Zfgz4wn0ROFkgTFmA98OU61934TZzcebRDRk/p138lTlO5tNS5RZCkeHmEK0s8MP Jan 23 08:05:45 np0005593103 certmonger[42512]: yE1mjMAHhCk4JQ7DMtb8qCq9UxpzpoqSosI/zBEOgrIx4ZOKJO8HMNXxHElC/8C2 Jan 23 08:05:45 np0005593103 certmonger[42512]: /d3dOSd9G9eVbwjMB9ByxF+QcK0iUhbxrm37n9BjkfZiALGs Jan 23 08:05:45 np0005593103 certmonger[42512]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:45 np0005593103 certmonger[42512]: " for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4RfL/Wz4hhLPg4LzadZ6vPLkKFWykbuER0KdPicv8byZsD0ulXya9RvvZ4ztlxRTDWziXX8SBE5fFFnpSsbYmLwWQEDJaSD1L3hcpf+AWlpzA2KIPcE+0Co7UHeCt7zEtNFBirfpMFZ5TIfKdt/KEXERQ9QF9/vDFjKkZM3V6026hqTDYH8ZwTHRW40X5Z5T7Fl3wlY+wTJsjDZz32Dy2oLy0D/ASjKJhaXtdymA18No7ULf0V/Ks83Lug8cr7/C2A/n8Jdye1YoPx3iwOqwrciGAPvDHoOU0nYtz4fMWYhnW/b4bvRk1R4cJh/B1unqmfguTBssGBTI8zA47QlJNwIDAQAB" for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:45 np0005593103 certmonger[42512]: 2026-01-23 08:05:45 [42512] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:45 np0005593103 certmonger[38997]: 2026-01-23 08:05:45 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:45 np0005593103 certmonger[42512]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:46 np0005593103 certmonger[42512]: Certificate: "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" Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Certificate submission still ongoing. Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Certificate submission attempt complete. Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Child status = 0. Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Child output: Jan 23 08:05:46 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:46 np0005593103 certmonger[38997]: MIIFcjCCA9qgAwIBAgIQB3tSFyazoILuzSMACtqycTANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:46 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:46 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDU0NVoXDTI4MDEyNDA4MDU0NVowPzERMA8GA1UECgwI Jan 23 08:05:46 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:46 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOEXy/1s+IYSz4OC Jan 23 08:05:46 np0005593103 certmonger[38997]: 82nWerzy5ChVspG7hEdCnT4nL/G8mbA9LpV8mvUb72eM7ZcUUw1s4l1/EgROXxRZ Jan 23 08:05:46 np0005593103 certmonger[38997]: 6UrG2Ji8FkBAyWkg9S94XKX/gFpacwNiiD3BPtAqO1B3gre8xLTRQYq36TBWeUyH Jan 23 08:05:46 np0005593103 certmonger[38997]: ynbfyhFxEUPUBff7wxYypGTN1etNuoakw2B/GcEx0VuNF+WeU+xZd8JWPsEybIw2 Jan 23 08:05:46 np0005593103 certmonger[38997]: c99g8tqC8tA/wEoyiYWl7XcpgNfDaO1C39FfyrPNy7oPHK+/wtgP5/CXcntWKD8d Jan 23 08:05:46 np0005593103 certmonger[38997]: 4sDqsK3IhgD7wx6DlNJ2Lc+HzFmIZ1v2+G70ZNUeHCYfwdbp6pn4LkwbLBgUyPMw Jan 23 08:05:46 np0005593103 certmonger[38997]: OO0JSTcCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:46 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:46 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:46 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO2+ Jan 23 08:05:46 np0005593103 certmonger[38997]: OBgkREEdgFEJdo/B0ajOXNigMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMy5p Jan 23 08:05:46 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5j Jan 23 08:05:46 np0005593103 certmonger[38997]: L25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:46 np0005593103 certmonger[38997]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMb Jan 23 08:05:46 np0005593103 certmonger[38997]: IW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:46 np0005593103 certmonger[38997]: AAOCAYEAZBxuPAReVHxXKZah3wokn/6ZKoaq1cjfkXf+Ksfts7mjUOimtPJdTt+l Jan 23 08:05:46 np0005593103 certmonger[38997]: 6E+l/VMsqzuFj0NPJo5kJ90BN21ndiVVWuZvJbfgi98yicSugika0IolzLF8Wftb Jan 23 08:05:46 np0005593103 certmonger[38997]: hXEpZCZo2L67DUoGNdcrL59gzUupNFhUCztnbitxWv75euQGcVemdFYUQ1S8S2a1 Jan 23 08:05:46 np0005593103 certmonger[38997]: Jc/0v3XB1KguddiLdXKQCn0ntpi9y+oLe8O32goClwAMulQAW+2fbnRLI2+aevar Jan 23 08:05:46 np0005593103 certmonger[38997]: 3IhbuOd9Qdm1JDyB3CbTZeOKupK17tU4McbxMJTblO5o2EBE40F4Ir3ieMyfSUDR Jan 23 08:05:46 np0005593103 certmonger[38997]: oX4YDrqQ/c8zT7ImQSTi9JsSN0LpNiqqk8Qru+86BheUYUp1u+V9ZiztxRjGjvqk Jan 23 08:05:46 np0005593103 certmonger[38997]: flDWNyj7Qvkl3qjCDMEwuBi876BQqdiUEfjFpNCsXKdkoaK54qib16tM/LH2qHfG Jan 23 08:05:46 np0005593103 certmonger[38997]: qW8hIFnQQG7z7w6Q0Rli/hlluVMyM6j4RxTOhU9HFwEWVyNcEzHOu3VMBQxm4eoT Jan 23 08:05:46 np0005593103 certmonger[38997]: TVkKDtu8 Jan 23 08:05:46 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:46 np0005593103 certmonger[38997]: " Jan 23 08:05:46 np0005593103 certmonger[42514]: 2026-01-23 08:05:46 [42514] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:46 np0005593103 certmonger[42514]: MIIFcjCCA9qgAwIBAgIQB3tSFyazoILuzSMACtqycTANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:46 np0005593103 certmonger[42514]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:46 np0005593103 certmonger[42514]: aXR5MB4XDTI2MDEyMzA4MDU0NVoXDTI4MDEyNDA4MDU0NVowPzERMA8GA1UECgwI Jan 23 08:05:46 np0005593103 certmonger[42514]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:46 np0005593103 certmonger[42514]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOEXy/1s+IYSz4OC Jan 23 08:05:46 np0005593103 certmonger[42514]: 82nWerzy5ChVspG7hEdCnT4nL/G8mbA9LpV8mvUb72eM7ZcUUw1s4l1/EgROXxRZ Jan 23 08:05:46 np0005593103 certmonger[42514]: 6UrG2Ji8FkBAyWkg9S94XKX/gFpacwNiiD3BPtAqO1B3gre8xLTRQYq36TBWeUyH Jan 23 08:05:46 np0005593103 certmonger[42514]: ynbfyhFxEUPUBff7wxYypGTN1etNuoakw2B/GcEx0VuNF+WeU+xZd8JWPsEybIw2 Jan 23 08:05:46 np0005593103 certmonger[42514]: c99g8tqC8tA/wEoyiYWl7XcpgNfDaO1C39FfyrPNy7oPHK+/wtgP5/CXcntWKD8d Jan 23 08:05:46 np0005593103 certmonger[42514]: 4sDqsK3IhgD7wx6DlNJ2Lc+HzFmIZ1v2+G70ZNUeHCYfwdbp6pn4LkwbLBgUyPMw Jan 23 08:05:46 np0005593103 certmonger[42514]: OO0JSTcCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:46 np0005593103 certmonger[42514]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593103 certmonger[42514]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:46 np0005593103 certmonger[42514]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593103 certmonger[42514]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:46 np0005593103 certmonger[42514]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO2+ Jan 23 08:05:46 np0005593103 certmonger[42514]: OBgkREEdgFEJdo/B0ajOXNigMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMy5p Jan 23 08:05:46 np0005593103 certmonger[42514]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5j Jan 23 08:05:46 np0005593103 certmonger[42514]: L25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:46 np0005593103 certmonger[42514]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMb Jan 23 08:05:46 np0005593103 certmonger[42514]: IW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:46 np0005593103 certmonger[42514]: AAOCAYEAZBxuPAReVHxXKZah3wokn/6ZKoaq1cjfkXf+Ksfts7mjUOimtPJdTt+l Jan 23 08:05:46 np0005593103 certmonger[42514]: 6E+l/VMsqzuFj0NPJo5kJ90BN21ndiVVWuZvJbfgi98yicSugika0IolzLF8Wftb Jan 23 08:05:46 np0005593103 certmonger[42514]: hXEpZCZo2L67DUoGNdcrL59gzUupNFhUCztnbitxWv75euQGcVemdFYUQ1S8S2a1 Jan 23 08:05:46 np0005593103 certmonger[42514]: Jc/0v3XB1KguddiLdXKQCn0ntpi9y+oLe8O32goClwAMulQAW+2fbnRLI2+aevar Jan 23 08:05:46 np0005593103 certmonger[42514]: 3IhbuOd9Qdm1JDyB3CbTZeOKupK17tU4McbxMJTblO5o2EBE40F4Ir3ieMyfSUDR Jan 23 08:05:46 np0005593103 certmonger[42514]: oX4YDrqQ/c8zT7ImQSTi9JsSN0LpNiqqk8Qru+86BheUYUp1u+V9ZiztxRjGjvqk Jan 23 08:05:46 np0005593103 certmonger[42514]: flDWNyj7Qvkl3qjCDMEwuBi876BQqdiUEfjFpNCsXKdkoaK54qib16tM/LH2qHfG Jan 23 08:05:46 np0005593103 certmonger[42514]: qW8hIFnQQG7z7w6Q0Rli/hlluVMyM6j4RxTOhU9HFwEWVyNcEzHOu3VMBQxm4eoT Jan 23 08:05:46 np0005593103 certmonger[42514]: TVkKDtu8 Jan 23 08:05:46 np0005593103 certmonger[42514]: -----END CERTIFICATE----- Jan 23 08:05:46 np0005593103 certmonger[42514]: ". Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Certificate submission still ongoing. Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Certificate submission postprocessing complete. Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Child status = 0. Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Child output: Jan 23 08:05:46 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nTVkKDtu8\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:46 np0005593103 certmonger[38997]: " Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:46 np0005593103 certmonger[38997]: MIIFcjCCA9qgAwIBAgIQB3tSFyazoILuzSMACtqycTANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:46 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:46 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDU0NVoXDTI4MDEyNDA4MDU0NVowPzERMA8GA1UECgwI Jan 23 08:05:46 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:46 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOEXy/1s+IYSz4OC Jan 23 08:05:46 np0005593103 certmonger[38997]: 82nWerzy5ChVspG7hEdCnT4nL/G8mbA9LpV8mvUb72eM7ZcUUw1s4l1/EgROXxRZ Jan 23 08:05:46 np0005593103 certmonger[38997]: 6UrG2Ji8FkBAyWkg9S94XKX/gFpacwNiiD3BPtAqO1B3gre8xLTRQYq36TBWeUyH Jan 23 08:05:46 np0005593103 certmonger[38997]: ynbfyhFxEUPUBff7wxYypGTN1etNuoakw2B/GcEx0VuNF+WeU+xZd8JWPsEybIw2 Jan 23 08:05:46 np0005593103 certmonger[38997]: c99g8tqC8tA/wEoyiYWl7XcpgNfDaO1C39FfyrPNy7oPHK+/wtgP5/CXcntWKD8d Jan 23 08:05:46 np0005593103 certmonger[38997]: 4sDqsK3IhgD7wx6DlNJ2Lc+HzFmIZ1v2+G70ZNUeHCYfwdbp6pn4LkwbLBgUyPMw Jan 23 08:05:46 np0005593103 certmonger[38997]: OO0JSTcCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:46 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:46 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:46 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:46 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO2+ Jan 23 08:05:46 np0005593103 certmonger[38997]: OBgkREEdgFEJdo/B0ajOXNigMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMy5p Jan 23 08:05:46 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5j Jan 23 08:05:46 np0005593103 certmonger[38997]: L25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:46 np0005593103 certmonger[38997]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMb Jan 23 08:05:46 np0005593103 certmonger[38997]: IW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:46 np0005593103 certmonger[38997]: AAOCAYEAZBxuPAReVHxXKZah3wokn/6ZKoaq1cjfkXf+Ksfts7mjUOimtPJdTt+l Jan 23 08:05:46 np0005593103 certmonger[38997]: 6E+l/VMsqzuFj0NPJo5kJ90BN21ndiVVWuZvJbfgi98yicSugika0IolzLF8Wftb Jan 23 08:05:46 np0005593103 certmonger[38997]: hXEpZCZo2L67DUoGNdcrL59gzUupNFhUCztnbitxWv75euQGcVemdFYUQ1S8S2a1 Jan 23 08:05:46 np0005593103 certmonger[38997]: Jc/0v3XB1KguddiLdXKQCn0ntpi9y+oLe8O32goClwAMulQAW+2fbnRLI2+aevar Jan 23 08:05:46 np0005593103 certmonger[38997]: 3IhbuOd9Qdm1JDyB3CbTZeOKupK17tU4McbxMJTblO5o2EBE40F4Ir3ieMyfSUDR Jan 23 08:05:46 np0005593103 certmonger[38997]: oX4YDrqQ/c8zT7ImQSTi9JsSN0LpNiqqk8Qru+86BheUYUp1u+V9ZiztxRjGjvqk Jan 23 08:05:46 np0005593103 certmonger[38997]: flDWNyj7Qvkl3qjCDMEwuBi876BQqdiUEfjFpNCsXKdkoaK54qib16tM/LH2qHfG Jan 23 08:05:46 np0005593103 certmonger[38997]: qW8hIFnQQG7z7w6Q0Rli/hlluVMyM6j4RxTOhU9HFwEWVyNcEzHOu3VMBQxm4eoT Jan 23 08:05:46 np0005593103 certmonger[38997]: TVkKDtu8 Jan 23 08:05:46 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:46 np0005593103 certmonger[38997]: ". Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] No hooks set for pre-save command. Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:46 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:46 np0005593103 certmonger[42589]: Certificate in file "/etc/pki/tls/certs/libvirt-vnc-client-cert.crt" issued by CA and saved. Jan 23 08:05:46 np0005593103 certmonger[38997]: 2026-01-23 08:05:46 [38997] Wrote to /var/lib/certmonger/requests/20260123080545 Jan 23 08:05:47 np0005593103 python3[42605]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:47 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:47 np0005593103 python3[42625]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:50 np0005593103 python3[42642]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:05:53 np0005593103 python3[42659]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:54 np0005593103 python3[42675]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:05:54 np0005593103 python3[42691]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:05:55 np0005593103 python3[42709]: ansible-certificate_request Invoked with name=novnc-proxy dns=['np0005593103.internalapi.ooo.test'] principal=['novnc-proxy/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/novnc-proxy.crt"#012service_key="/etc/pki/tls/private/novnc-proxy.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:05:55 np0005593103 certmonger[38997]: 2026-01-23 08:05:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:55 np0005593103 certmonger[38997]: 2026-01-23 08:05:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:55 np0005593103 certmonger[38997]: 2026-01-23 08:05:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:55 np0005593103 certmonger[38997]: 2026-01-23 08:05:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:55 np0005593103 certmonger[38997]: 2026-01-23 08:05:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:55 np0005593103 certmonger[38997]: 2026-01-23 08:05:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:55 np0005593103 certmonger[38997]: 2026-01-23 08:05:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:55 np0005593103 certmonger[38997]: 2026-01-23 08:05:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:55 np0005593103 certmonger[38997]: 2026-01-23 08:05:55 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:05:56 np0005593103 certmonger[42719]: " for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_REQ_PRINCIPAL" to "novnc-proxy/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:05:56 np0005593103 certmonger[42719]: " for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:05:56 np0005593103 certmonger[42719]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:05:56 np0005593103 certmonger[42719]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwMwLLDh2 Jan 23 08:05:56 np0005593103 certmonger[42719]: s3P9n0WZyxpn501C2Kmmc6P+YVp6vTwRKnSAQvUQUvIg14flK81CWTe3vYPDnsrE Jan 23 08:05:56 np0005593103 certmonger[42719]: TH+wtPN+VIkX8SeSEBVZ+t1d+L0RtShj0iNWQr7JwOJRuQD2RC4yAihke8ZLus66 Jan 23 08:05:56 np0005593103 certmonger[42719]: TQvRvs7STa7MKx6ltyJrc0JelH/i5I+ahOG+q71EGsYV2GWZA7LGSVgr4Ji6zmKS Jan 23 08:05:56 np0005593103 certmonger[42719]: kCtRRT9B0zOQ2Cs4O4GR5TMa/2RH2FMEYfEhktXTSY5gj0y6gvc3rk3xIVxNUv9q Jan 23 08:05:56 np0005593103 certmonger[42719]: /U0eanY89YW510W6ybhV6LP5k9NZ8jSJ0hc6gXJD4+jj0qDfccpHRk6i9lxZVGqU Jan 23 08:05:56 np0005593103 certmonger[42719]: D46Xt2LrzRI5cQIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:05:56 np0005593103 certmonger[42719]: ADIAMwAwADgAMAA1ADUANTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Jan 23 08:05:56 np0005593103 certmonger[42719]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:05:56 np0005593103 certmonger[42719]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94eS9ucDAwMDU1OTMxMDMu Jan 23 08:05:56 np0005593103 certmonger[42719]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Jan 23 08:05:56 np0005593103 certmonger[42719]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5GyFucDAwMDU1OTMxMDMu Jan 23 08:05:56 np0005593103 certmonger[42719]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Jan 23 08:05:56 np0005593103 certmonger[42719]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFKP0InTTGNB/3sJxJCdAnCAQw98v Jan 23 08:05:56 np0005593103 certmonger[42719]: MA0GCSqGSIb3DQEBCwUAA4IBAQBuuOuG018OcT3KAzZf0QSDDecsv8r8+4iAYMci Jan 23 08:05:56 np0005593103 certmonger[42719]: KUtdlgr43AawiW21tLIMbwpyuhH6+Z3wc4Yh6HS50sgQEp+cFLJH3kU5pIxqEjQY Jan 23 08:05:56 np0005593103 certmonger[42719]: EdBabIfaVesuXYKqtpFYZe+oJQfcHH/n3Z5JRCaBj8Gdo/EC9F64bZgdDIWkKuVL Jan 23 08:05:56 np0005593103 certmonger[42719]: qxwPDfteyEWOos6eVvi/lrJvxdRK5pm7Twt4XzQebPqc5NsqavjOTrq6qGzvwQG0 Jan 23 08:05:56 np0005593103 certmonger[42719]: qHlhcuF18qhhYOhHY2qwZymBq/emERHRC4u/bGH2OoGTydXFin02egC7igz+yR8a Jan 23 08:05:56 np0005593103 certmonger[42719]: gQaEWmArOk43ianUxlO/oHny3VQ+YojoydJaCgMgS2/iGnGY Jan 23 08:05:56 np0005593103 certmonger[42719]: -----END CERTIFICATE REQUEST----- Jan 23 08:05:56 np0005593103 certmonger[42719]: " for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwMwLLDh2s3P9n0WZyxpn501C2Kmmc6P+YVp6vTwRKnSAQvUQUvIg14flK81CWTe3vYPDnsrETH+wtPN+VIkX8SeSEBVZ+t1d+L0RtShj0iNWQr7JwOJRuQD2RC4yAihke8ZLus66TQvRvs7STa7MKx6ltyJrc0JelH/i5I+ahOG+q71EGsYV2GWZA7LGSVgr4Ji6zmKSkCtRRT9B0zOQ2Cs4O4GR5TMa/2RH2FMEYfEhktXTSY5gj0y6gvc3rk3xIVxNUv9q/U0eanY89YW510W6ybhV6LP5k9NZ8jSJ0hc6gXJD4+jj0qDfccpHRk6i9lxZVGqUD46Xt2LrzRI5cQIDAQAB" for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:56 np0005593103 certmonger[42719]: 2026-01-23 08:05:56 [42719] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[42719]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:05:56 np0005593103 certmonger[42719]: Certificate: "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" Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Certificate submission still ongoing. Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Certificate submission attempt complete. Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Child status = 0. Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Child output: Jan 23 08:05:56 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:05:56 np0005593103 certmonger[38997]: MIIFcjCCA9qgAwIBAgIQVtSIHNuWxy5zRQujF0mDDzANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:56 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:56 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDU1NloXDTI4MDEyNDA4MDU1NlowPzERMA8GA1UECgwI Jan 23 08:05:56 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:56 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMDMCyw4drNz/Z9F Jan 23 08:05:56 np0005593103 certmonger[38997]: mcsaZ+dNQtippnOj/mFaer08ESp0gEL1EFLyINeH5SvNQlk3t72Dw57KxEx/sLTz Jan 23 08:05:56 np0005593103 certmonger[38997]: flSJF/EnkhAVWfrdXfi9EbUoY9IjVkK+ycDiUbkA9kQuMgIoZHvGS7rOuk0L0b7O Jan 23 08:05:56 np0005593103 certmonger[38997]: 0k2uzCsepbcia3NCXpR/4uSPmoThvqu9RBrGFdhlmQOyxklYK+CYus5ikpArUUU/ Jan 23 08:05:56 np0005593103 certmonger[38997]: QdMzkNgrODuBkeUzGv9kR9hTBGHxIZLV00mOYI9MuoL3N65N8SFcTVL/av1NHmp2 Jan 23 08:05:56 np0005593103 certmonger[38997]: PPWFuddFusm4Veiz+ZPTWfI0idIXOoFyQ+Po49Kg33HKR0ZOovZcWVRqlA+Ol7di Jan 23 08:05:56 np0005593103 certmonger[38997]: 680SOXECAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:56 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:56 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:56 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:56 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:56 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMS8 Jan 23 08:05:56 np0005593103 certmonger[38997]: L0wE129YN9WX36rH2fu6koITMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMy5p Jan 23 08:05:56 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5 Jan 23 08:05:56 np0005593103 certmonger[38997]: L25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:56 np0005593103 certmonger[38997]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkb Jan 23 08:05:56 np0005593103 certmonger[38997]: IW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:56 np0005593103 certmonger[38997]: AAOCAYEAOWmuMmvbowwMS1lMZR/7r6LgLf8kNw2OkOcsDeH+T0CIewkhrjEb5rdR Jan 23 08:05:56 np0005593103 certmonger[38997]: QmrvNE7XSuWlMgOO0kmALi65H5+ayqZI/5BrhG4cWq5ouT0TypuMjzp9+Ff9COxc Jan 23 08:05:56 np0005593103 certmonger[38997]: vmOTN6VAy3uRyWgJ87InqKdWHdDetYKPDaXxb12JuKT29k9JqjV6j0BfAfg8wQqY Jan 23 08:05:56 np0005593103 certmonger[38997]: u/GvKBd54KvSCSROhtgfZMq70qWkH1t5LcYGScsUlsBzH6ajPI6sSQT8eVlkI9xt Jan 23 08:05:56 np0005593103 certmonger[38997]: TmsNvMc0S3rNCaYrINTynMsBHvBR7StdySUlgrZ2JilKBVqpYgf6Uvrx8rWs50uj Jan 23 08:05:56 np0005593103 certmonger[38997]: 0NweDJIMd3p+IWlgm0XaFxjog0L1O4QrPEkkZn0H4UZzH8psmThJCadvIDq+K7n2 Jan 23 08:05:56 np0005593103 certmonger[38997]: FL2KqK/mQ1QYb6isO2rPllwWMrhjv1ejy8GCNgpZQXKPZJ33jKaOZJ/jm+ELD/Tl Jan 23 08:05:56 np0005593103 certmonger[38997]: tNVD41/EwrxbSsuDiePImgM/GP47hog99sXjNQjLaQxROgPNLFuSDHcpjDy5F/7X Jan 23 08:05:56 np0005593103 certmonger[38997]: 7NJwdgiJ Jan 23 08:05:56 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:56 np0005593103 certmonger[38997]: " Jan 23 08:05:56 np0005593103 certmonger[42721]: 2026-01-23 08:05:56 [42721] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:05:56 np0005593103 certmonger[42721]: MIIFcjCCA9qgAwIBAgIQVtSIHNuWxy5zRQujF0mDDzANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:56 np0005593103 certmonger[42721]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:56 np0005593103 certmonger[42721]: aXR5MB4XDTI2MDEyMzA4MDU1NloXDTI4MDEyNDA4MDU1NlowPzERMA8GA1UECgwI Jan 23 08:05:56 np0005593103 certmonger[42721]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:56 np0005593103 certmonger[42721]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMDMCyw4drNz/Z9F Jan 23 08:05:56 np0005593103 certmonger[42721]: mcsaZ+dNQtippnOj/mFaer08ESp0gEL1EFLyINeH5SvNQlk3t72Dw57KxEx/sLTz Jan 23 08:05:56 np0005593103 certmonger[42721]: flSJF/EnkhAVWfrdXfi9EbUoY9IjVkK+ycDiUbkA9kQuMgIoZHvGS7rOuk0L0b7O Jan 23 08:05:56 np0005593103 certmonger[42721]: 0k2uzCsepbcia3NCXpR/4uSPmoThvqu9RBrGFdhlmQOyxklYK+CYus5ikpArUUU/ Jan 23 08:05:56 np0005593103 certmonger[42721]: QdMzkNgrODuBkeUzGv9kR9hTBGHxIZLV00mOYI9MuoL3N65N8SFcTVL/av1NHmp2 Jan 23 08:05:56 np0005593103 certmonger[42721]: PPWFuddFusm4Veiz+ZPTWfI0idIXOoFyQ+Po49Kg33HKR0ZOovZcWVRqlA+Ol7di Jan 23 08:05:56 np0005593103 certmonger[42721]: 680SOXECAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:56 np0005593103 certmonger[42721]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:56 np0005593103 certmonger[42721]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:56 np0005593103 certmonger[42721]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:56 np0005593103 certmonger[42721]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:56 np0005593103 certmonger[42721]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMS8 Jan 23 08:05:56 np0005593103 certmonger[42721]: L0wE129YN9WX36rH2fu6koITMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMy5p Jan 23 08:05:56 np0005593103 certmonger[42721]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5 Jan 23 08:05:56 np0005593103 certmonger[42721]: L25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:56 np0005593103 certmonger[42721]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkb Jan 23 08:05:56 np0005593103 certmonger[42721]: IW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:56 np0005593103 certmonger[42721]: AAOCAYEAOWmuMmvbowwMS1lMZR/7r6LgLf8kNw2OkOcsDeH+T0CIewkhrjEb5rdR Jan 23 08:05:56 np0005593103 certmonger[42721]: QmrvNE7XSuWlMgOO0kmALi65H5+ayqZI/5BrhG4cWq5ouT0TypuMjzp9+Ff9COxc Jan 23 08:05:56 np0005593103 certmonger[42721]: vmOTN6VAy3uRyWgJ87InqKdWHdDetYKPDaXxb12JuKT29k9JqjV6j0BfAfg8wQqY Jan 23 08:05:56 np0005593103 certmonger[42721]: u/GvKBd54KvSCSROhtgfZMq70qWkH1t5LcYGScsUlsBzH6ajPI6sSQT8eVlkI9xt Jan 23 08:05:56 np0005593103 certmonger[42721]: TmsNvMc0S3rNCaYrINTynMsBHvBR7StdySUlgrZ2JilKBVqpYgf6Uvrx8rWs50uj Jan 23 08:05:56 np0005593103 certmonger[42721]: 0NweDJIMd3p+IWlgm0XaFxjog0L1O4QrPEkkZn0H4UZzH8psmThJCadvIDq+K7n2 Jan 23 08:05:56 np0005593103 certmonger[42721]: FL2KqK/mQ1QYb6isO2rPllwWMrhjv1ejy8GCNgpZQXKPZJ33jKaOZJ/jm+ELD/Tl Jan 23 08:05:56 np0005593103 certmonger[42721]: tNVD41/EwrxbSsuDiePImgM/GP47hog99sXjNQjLaQxROgPNLFuSDHcpjDy5F/7X Jan 23 08:05:56 np0005593103 certmonger[42721]: 7NJwdgiJ Jan 23 08:05:56 np0005593103 certmonger[42721]: -----END CERTIFICATE----- Jan 23 08:05:56 np0005593103 certmonger[42721]: ". Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Certificate submission still ongoing. Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Certificate submission postprocessing complete. Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Child status = 0. Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Child output: Jan 23 08:05:56 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n7NJwdgiJ\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:05:56 np0005593103 certmonger[38997]: " Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:05:56 np0005593103 certmonger[38997]: MIIFcjCCA9qgAwIBAgIQVtSIHNuWxy5zRQujF0mDDzANBgkqhkiG9w0BAQsFADAz Jan 23 08:05:56 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:05:56 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDU1NloXDTI4MDEyNDA4MDU1NlowPzERMA8GA1UECgwI Jan 23 08:05:56 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:05:56 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMDMCyw4drNz/Z9F Jan 23 08:05:56 np0005593103 certmonger[38997]: mcsaZ+dNQtippnOj/mFaer08ESp0gEL1EFLyINeH5SvNQlk3t72Dw57KxEx/sLTz Jan 23 08:05:56 np0005593103 certmonger[38997]: flSJF/EnkhAVWfrdXfi9EbUoY9IjVkK+ycDiUbkA9kQuMgIoZHvGS7rOuk0L0b7O Jan 23 08:05:56 np0005593103 certmonger[38997]: 0k2uzCsepbcia3NCXpR/4uSPmoThvqu9RBrGFdhlmQOyxklYK+CYus5ikpArUUU/ Jan 23 08:05:56 np0005593103 certmonger[38997]: QdMzkNgrODuBkeUzGv9kR9hTBGHxIZLV00mOYI9MuoL3N65N8SFcTVL/av1NHmp2 Jan 23 08:05:56 np0005593103 certmonger[38997]: PPWFuddFusm4Veiz+ZPTWfI0idIXOoFyQ+Po49Kg33HKR0ZOovZcWVRqlA+Ol7di Jan 23 08:05:56 np0005593103 certmonger[38997]: 680SOXECAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:05:56 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:05:56 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:05:56 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:05:56 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:05:56 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMS8 Jan 23 08:05:56 np0005593103 certmonger[38997]: L0wE129YN9WX36rH2fu6koITMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU5MzEwMy5p Jan 23 08:05:56 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5 Jan 23 08:05:56 np0005593103 certmonger[38997]: L25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYr Jan 23 08:05:56 np0005593103 certmonger[38997]: BgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkb Jan 23 08:05:56 np0005593103 certmonger[38997]: IW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsF Jan 23 08:05:56 np0005593103 certmonger[38997]: AAOCAYEAOWmuMmvbowwMS1lMZR/7r6LgLf8kNw2OkOcsDeH+T0CIewkhrjEb5rdR Jan 23 08:05:56 np0005593103 certmonger[38997]: QmrvNE7XSuWlMgOO0kmALi65H5+ayqZI/5BrhG4cWq5ouT0TypuMjzp9+Ff9COxc Jan 23 08:05:56 np0005593103 certmonger[38997]: vmOTN6VAy3uRyWgJ87InqKdWHdDetYKPDaXxb12JuKT29k9JqjV6j0BfAfg8wQqY Jan 23 08:05:56 np0005593103 certmonger[38997]: u/GvKBd54KvSCSROhtgfZMq70qWkH1t5LcYGScsUlsBzH6ajPI6sSQT8eVlkI9xt Jan 23 08:05:56 np0005593103 certmonger[38997]: TmsNvMc0S3rNCaYrINTynMsBHvBR7StdySUlgrZ2JilKBVqpYgf6Uvrx8rWs50uj Jan 23 08:05:56 np0005593103 certmonger[38997]: 0NweDJIMd3p+IWlgm0XaFxjog0L1O4QrPEkkZn0H4UZzH8psmThJCadvIDq+K7n2 Jan 23 08:05:56 np0005593103 certmonger[38997]: FL2KqK/mQ1QYb6isO2rPllwWMrhjv1ejy8GCNgpZQXKPZJ33jKaOZJ/jm+ELD/Tl Jan 23 08:05:56 np0005593103 certmonger[38997]: tNVD41/EwrxbSsuDiePImgM/GP47hog99sXjNQjLaQxROgPNLFuSDHcpjDy5F/7X Jan 23 08:05:56 np0005593103 certmonger[38997]: 7NJwdgiJ Jan 23 08:05:56 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:05:56 np0005593103 certmonger[38997]: ". Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] No hooks set for pre-save command. Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:56 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:56 np0005593103 certmonger[42795]: Certificate in file "/etc/pki/tls/certs/novnc-proxy.crt" issued by CA and saved. Jan 23 08:05:56 np0005593103 certmonger[38997]: 2026-01-23 08:05:56 [38997] Wrote to /var/lib/certmonger/requests/20260123080555 Jan 23 08:05:57 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:05:58 np0005593103 python3[42811]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:05:59 np0005593103 python3[42831]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:02 np0005593103 python3[42848]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:05 np0005593103 python3[42865]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:05 np0005593103 python3[42881]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:06 np0005593103 python3[42897]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:06:06 np0005593103 python3[42915]: ansible-certificate_request Invoked with name=ovn_dbs dns=['np0005593103.internalapi.ooo.test'] principal=['ovn_dbs/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Jan 23 08:06:06 np0005593103 certmonger[38997]: 2026-01-23 08:06:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:06 np0005593103 certmonger[38997]: 2026-01-23 08:06:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:06 np0005593103 certmonger[38997]: 2026-01-23 08:06:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:06 np0005593103 certmonger[38997]: 2026-01-23 08:06:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:06 np0005593103 certmonger[38997]: 2026-01-23 08:06:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:06 np0005593103 certmonger[38997]: 2026-01-23 08:06:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:06 np0005593103 certmonger[38997]: 2026-01-23 08:06:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:06 np0005593103 certmonger[38997]: 2026-01-23 08:06:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:06 np0005593103 certmonger[38997]: 2026-01-23 08:06:06 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:06:07 np0005593103 certmonger[42925]: " for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_dbs/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:06:07 np0005593103 certmonger[42925]: " for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:06:07 np0005593103 certmonger[42925]: MIID2DCCAsACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:06:07 np0005593103 certmonger[42925]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkbH3WozN Jan 23 08:06:07 np0005593103 certmonger[42925]: qK6af+ct3Tqb4O6sfNRo8078CoNh3rJeENvdsOgFtn9qnfvaIYWQoM8pgQDZIoDN Jan 23 08:06:07 np0005593103 certmonger[42925]: LRnWKw3iGw7dwd5obIhsdDvWTOSdIRCZ6usr5fP4QnfcRja4JthI0UtKgrK4pU8U Jan 23 08:06:07 np0005593103 certmonger[42925]: I16BQqek/j98aGAd4bVfGMObMAqxTyjxxkinX+UQMO9zNkpnQJo/jM8EWwyVIdGj Jan 23 08:06:07 np0005593103 certmonger[42925]: c6SSXXwhMddPwv49IRSL9rKhqcTaanjDeUDjL+o6WC97uoLTsclg+MSozjFnikue Jan 23 08:06:07 np0005593103 certmonger[42925]: GrXg0GQwiqhYpj3qvc/jefnfr5LRgw93CWJmwGBKaEsuiNb/yeAZ0IlbfkO2dNTC Jan 23 08:06:07 np0005593103 certmonger[42925]: mtHhq6mVUQq6DwIDAQABoIIBZTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:06:07 np0005593103 certmonger[42925]: ADIAMwAwADgAMAA2ADAANjCCATQGCSqGSIb3DQEJDjGCASUwggEhMAsGA1UdDwQE Jan 23 08:06:07 np0005593103 certmonger[42925]: AwIFoDCBxQYDVR0RBIG9MIG6giFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:06:07 np0005593103 certmonger[42925]: LnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25wMDAwNTU5MzEwMy5pbnRl Jan 23 08:06:07 np0005593103 certmonger[42925]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEFAgKgRzBFoAobCE9PTy5U Jan 23 08:06:07 np0005593103 certmonger[42925]: RVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1NTkzMTAzLmludGVybmFs Jan 23 08:06:07 np0005593103 certmonger[42925]: YXBpLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNV Jan 23 08:06:07 np0005593103 certmonger[42925]: HRMBAf8EAjAAMB0GA1UdDgQWBBSmy+nwXMlmgjbj0lU6TKNif4MXzjANBgkqhkiG Jan 23 08:06:07 np0005593103 certmonger[42925]: 9w0BAQsFAAOCAQEAF2r0B87GhwavIAd/fO3/U1nnJ9kR7qdUffOiYIl/ksHqzcx0 Jan 23 08:06:07 np0005593103 certmonger[42925]: rQMItQeEIbURjtcVZ+Z08llHpsJ035UE9+y3troPWymQ0pZehXTsAdR4nXWrfWzR Jan 23 08:06:07 np0005593103 certmonger[42925]: laMjWXVfNXPJTCR5vQ6tLIJWILJavy14bhOAJRgb1VZgKnCMyO5o0M6pTPwENUk4 Jan 23 08:06:07 np0005593103 certmonger[42925]: z4hUo+z6ksb5rjraC5/ZIYt0SALlzTrWLT1FODuQzEzSTEfXc84lfVZ0tatVgHvs Jan 23 08:06:07 np0005593103 certmonger[42925]: aCOTIvbYaZdfgcIutnf07XsMHrwCAIAiI1S4oqt4wniGca/scABLkkC5C+PpfR2G Jan 23 08:06:07 np0005593103 certmonger[42925]: gXsLMWki3pegaHrjD7K1CG9zDV7Uo3QmlwgCDA== Jan 23 08:06:07 np0005593103 certmonger[42925]: -----END CERTIFICATE REQUEST----- Jan 23 08:06:07 np0005593103 certmonger[42925]: " for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkbH3WozNqK6af+ct3Tqb4O6sfNRo8078CoNh3rJeENvdsOgFtn9qnfvaIYWQoM8pgQDZIoDNLRnWKw3iGw7dwd5obIhsdDvWTOSdIRCZ6usr5fP4QnfcRja4JthI0UtKgrK4pU8UI16BQqek/j98aGAd4bVfGMObMAqxTyjxxkinX+UQMO9zNkpnQJo/jM8EWwyVIdGjc6SSXXwhMddPwv49IRSL9rKhqcTaanjDeUDjL+o6WC97uoLTsclg+MSozjFnikueGrXg0GQwiqhYpj3qvc/jefnfr5LRgw93CWJmwGBKaEsuiNb/yeAZ0IlbfkO2dNTCmtHhq6mVUQq6DwIDAQAB" for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:07 np0005593103 certmonger[42925]: 2026-01-23 08:06:07 [42925] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[42925]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:06:07 np0005593103 certmonger[42925]: Certificate: "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" Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Certificate submission still ongoing. Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Certificate submission attempt complete. Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Child status = 0. Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Child output: Jan 23 08:06:07 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:06:07 np0005593103 certmonger[38997]: MIIFajCCA9KgAwIBAgIQL0dbkZeQOg+PNalfzGYm3jANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:07 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:07 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDYwN1oXDTI4MDEyNDA4MDYwN1owPzERMA8GA1UECgwI Jan 23 08:06:07 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:07 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJGx91qMzaiumn/n Jan 23 08:06:07 np0005593103 certmonger[38997]: Ld06m+DurHzUaPNO/AqDYd6yXhDb3bDoBbZ/ap372iGFkKDPKYEA2SKAzS0Z1isN Jan 23 08:06:07 np0005593103 certmonger[38997]: 4hsO3cHeaGyIbHQ71kzknSEQmerrK+Xz+EJ33EY2uCbYSNFLSoKyuKVPFCNegUKn Jan 23 08:06:07 np0005593103 certmonger[38997]: pP4/fGhgHeG1XxjDmzAKsU8o8cZIp1/lEDDvczZKZ0CaP4zPBFsMlSHRo3Okkl18 Jan 23 08:06:07 np0005593103 certmonger[38997]: ITHXT8L+PSEUi/ayoanE2mp4w3lA4y/qOlgve7qC07HJYPjEqM4xZ4pLnhq14NBk Jan 23 08:06:07 np0005593103 certmonger[38997]: MIqoWKY96r3P43n536+S0YMPdwliZsBgSmhLLojW/8ngGdCJW35DtnTUwprR4aup Jan 23 08:06:07 np0005593103 certmonger[38997]: lVEKug8CAwEAAaOCAewwggHoMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:07 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:07 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:07 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:07 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:07 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNjY Jan 23 08:06:07 np0005593103 certmonger[38997]: kw99DHlN+X8Q/vbZXyJbYLiqMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU5MzEwMy5p Jan 23 08:06:07 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAw Jan 23 08:06:07 np0005593103 certmonger[38997]: MDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUC Jan 23 08:06:07 np0005593103 certmonger[38997]: AqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1 Jan 23 08:06:07 np0005593103 certmonger[38997]: OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAFGa Jan 23 08:06:07 np0005593103 certmonger[38997]: QjHftukseQZQSkWIUSSN03vt4FCKyWXW41VheWOAYjH3k0fDYtA+lYeYu7g2hbgN Jan 23 08:06:07 np0005593103 certmonger[38997]: WpsFTpbOjyBlTsD+ZLIf447K1Ty81O/p397mWuT5wHmk2u8kKgjt6NJBgUieqfcM Jan 23 08:06:07 np0005593103 certmonger[38997]: VphJ/+J6SzZEcbKR7CB8qI5V5gl/tz8VcLB+mfHQvtQiJcUvAAtGIkXY+ZzD/2Ib Jan 23 08:06:07 np0005593103 certmonger[38997]: RJcci9oLOWbQWeYREdMlK3rXLhUXg/7t3v7xmdg8FFxtHbRM/9F+y+XFKBLCZNCY Jan 23 08:06:07 np0005593103 certmonger[38997]: rMPIv6QcFvtPNIIKC38pnbTJXfu1Es6MBh34WwddML0VWS9zzoAKPPxehZhLeT4r Jan 23 08:06:07 np0005593103 certmonger[38997]: WsfQx5BC+bK+Y7VdSb7iSSiWKHR9ekitTzaFE2OsJ7FcxAY/lKdn9Zn6XB3BGj8P Jan 23 08:06:07 np0005593103 certmonger[38997]: civ2qGuyZD73qYpHv4Imc1w/Cf3I9MiHqBiz7lxp7RJ6BVf3PHi8EXBtxwiU50cN Jan 23 08:06:07 np0005593103 certmonger[38997]: IwaXLvoE0tioiF1T01fGlHL5H4iUDpJBpEnpEjnZ4liVy2r+7+ofvMVZPF477Q== Jan 23 08:06:07 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:06:07 np0005593103 certmonger[38997]: " Jan 23 08:06:07 np0005593103 certmonger[42927]: 2026-01-23 08:06:07 [42927] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:06:07 np0005593103 certmonger[42927]: MIIFajCCA9KgAwIBAgIQL0dbkZeQOg+PNalfzGYm3jANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:07 np0005593103 certmonger[42927]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:07 np0005593103 certmonger[42927]: aXR5MB4XDTI2MDEyMzA4MDYwN1oXDTI4MDEyNDA4MDYwN1owPzERMA8GA1UECgwI Jan 23 08:06:07 np0005593103 certmonger[42927]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:07 np0005593103 certmonger[42927]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJGx91qMzaiumn/n Jan 23 08:06:07 np0005593103 certmonger[42927]: Ld06m+DurHzUaPNO/AqDYd6yXhDb3bDoBbZ/ap372iGFkKDPKYEA2SKAzS0Z1isN Jan 23 08:06:07 np0005593103 certmonger[42927]: 4hsO3cHeaGyIbHQ71kzknSEQmerrK+Xz+EJ33EY2uCbYSNFLSoKyuKVPFCNegUKn Jan 23 08:06:07 np0005593103 certmonger[42927]: pP4/fGhgHeG1XxjDmzAKsU8o8cZIp1/lEDDvczZKZ0CaP4zPBFsMlSHRo3Okkl18 Jan 23 08:06:07 np0005593103 certmonger[42927]: ITHXT8L+PSEUi/ayoanE2mp4w3lA4y/qOlgve7qC07HJYPjEqM4xZ4pLnhq14NBk Jan 23 08:06:07 np0005593103 certmonger[42927]: MIqoWKY96r3P43n536+S0YMPdwliZsBgSmhLLojW/8ngGdCJW35DtnTUwprR4aup Jan 23 08:06:07 np0005593103 certmonger[42927]: lVEKug8CAwEAAaOCAewwggHoMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:07 np0005593103 certmonger[42927]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:07 np0005593103 certmonger[42927]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:07 np0005593103 certmonger[42927]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:07 np0005593103 certmonger[42927]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:07 np0005593103 certmonger[42927]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNjY Jan 23 08:06:07 np0005593103 certmonger[42927]: kw99DHlN+X8Q/vbZXyJbYLiqMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU5MzEwMy5p Jan 23 08:06:07 np0005593103 certmonger[42927]: bnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAw Jan 23 08:06:07 np0005593103 certmonger[42927]: MDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUC Jan 23 08:06:07 np0005593103 certmonger[42927]: AqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1 Jan 23 08:06:07 np0005593103 certmonger[42927]: OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAFGa Jan 23 08:06:07 np0005593103 certmonger[42927]: QjHftukseQZQSkWIUSSN03vt4FCKyWXW41VheWOAYjH3k0fDYtA+lYeYu7g2hbgN Jan 23 08:06:07 np0005593103 certmonger[42927]: WpsFTpbOjyBlTsD+ZLIf447K1Ty81O/p397mWuT5wHmk2u8kKgjt6NJBgUieqfcM Jan 23 08:06:07 np0005593103 certmonger[42927]: VphJ/+J6SzZEcbKR7CB8qI5V5gl/tz8VcLB+mfHQvtQiJcUvAAtGIkXY+ZzD/2Ib Jan 23 08:06:07 np0005593103 certmonger[42927]: RJcci9oLOWbQWeYREdMlK3rXLhUXg/7t3v7xmdg8FFxtHbRM/9F+y+XFKBLCZNCY Jan 23 08:06:07 np0005593103 certmonger[42927]: rMPIv6QcFvtPNIIKC38pnbTJXfu1Es6MBh34WwddML0VWS9zzoAKPPxehZhLeT4r Jan 23 08:06:07 np0005593103 certmonger[42927]: WsfQx5BC+bK+Y7VdSb7iSSiWKHR9ekitTzaFE2OsJ7FcxAY/lKdn9Zn6XB3BGj8P Jan 23 08:06:07 np0005593103 certmonger[42927]: civ2qGuyZD73qYpHv4Imc1w/Cf3I9MiHqBiz7lxp7RJ6BVf3PHi8EXBtxwiU50cN Jan 23 08:06:07 np0005593103 certmonger[42927]: IwaXLvoE0tioiF1T01fGlHL5H4iUDpJBpEnpEjnZ4liVy2r+7+ofvMVZPF477Q== Jan 23 08:06:07 np0005593103 certmonger[42927]: -----END CERTIFICATE----- Jan 23 08:06:07 np0005593103 certmonger[42927]: ". Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Certificate submission still ongoing. Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Certificate submission postprocessing complete. Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Child status = 0. Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Child output: Jan 23 08:06:07 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:06:07 np0005593103 certmonger[38997]: " Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:06:07 np0005593103 certmonger[38997]: MIIFajCCA9KgAwIBAgIQL0dbkZeQOg+PNalfzGYm3jANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:07 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:07 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDYwN1oXDTI4MDEyNDA4MDYwN1owPzERMA8GA1UECgwI Jan 23 08:06:07 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:07 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJGx91qMzaiumn/n Jan 23 08:06:07 np0005593103 certmonger[38997]: Ld06m+DurHzUaPNO/AqDYd6yXhDb3bDoBbZ/ap372iGFkKDPKYEA2SKAzS0Z1isN Jan 23 08:06:07 np0005593103 certmonger[38997]: 4hsO3cHeaGyIbHQ71kzknSEQmerrK+Xz+EJ33EY2uCbYSNFLSoKyuKVPFCNegUKn Jan 23 08:06:07 np0005593103 certmonger[38997]: pP4/fGhgHeG1XxjDmzAKsU8o8cZIp1/lEDDvczZKZ0CaP4zPBFsMlSHRo3Okkl18 Jan 23 08:06:07 np0005593103 certmonger[38997]: ITHXT8L+PSEUi/ayoanE2mp4w3lA4y/qOlgve7qC07HJYPjEqM4xZ4pLnhq14NBk Jan 23 08:06:07 np0005593103 certmonger[38997]: MIqoWKY96r3P43n536+S0YMPdwliZsBgSmhLLojW/8ngGdCJW35DtnTUwprR4aup Jan 23 08:06:07 np0005593103 certmonger[38997]: lVEKug8CAwEAAaOCAewwggHoMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:07 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:07 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:07 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:07 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:07 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNjY Jan 23 08:06:07 np0005593103 certmonger[38997]: kw99DHlN+X8Q/vbZXyJbYLiqMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU5MzEwMy5p Jan 23 08:06:07 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAw Jan 23 08:06:07 np0005593103 certmonger[38997]: MDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUC Jan 23 08:06:07 np0005593103 certmonger[38997]: AqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1 Jan 23 08:06:07 np0005593103 certmonger[38997]: OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAFGa Jan 23 08:06:07 np0005593103 certmonger[38997]: QjHftukseQZQSkWIUSSN03vt4FCKyWXW41VheWOAYjH3k0fDYtA+lYeYu7g2hbgN Jan 23 08:06:07 np0005593103 certmonger[38997]: WpsFTpbOjyBlTsD+ZLIf447K1Ty81O/p397mWuT5wHmk2u8kKgjt6NJBgUieqfcM Jan 23 08:06:07 np0005593103 certmonger[38997]: VphJ/+J6SzZEcbKR7CB8qI5V5gl/tz8VcLB+mfHQvtQiJcUvAAtGIkXY+ZzD/2Ib Jan 23 08:06:07 np0005593103 certmonger[38997]: RJcci9oLOWbQWeYREdMlK3rXLhUXg/7t3v7xmdg8FFxtHbRM/9F+y+XFKBLCZNCY Jan 23 08:06:07 np0005593103 certmonger[38997]: rMPIv6QcFvtPNIIKC38pnbTJXfu1Es6MBh34WwddML0VWS9zzoAKPPxehZhLeT4r Jan 23 08:06:07 np0005593103 certmonger[38997]: WsfQx5BC+bK+Y7VdSb7iSSiWKHR9ekitTzaFE2OsJ7FcxAY/lKdn9Zn6XB3BGj8P Jan 23 08:06:07 np0005593103 certmonger[38997]: civ2qGuyZD73qYpHv4Imc1w/Cf3I9MiHqBiz7lxp7RJ6BVf3PHi8EXBtxwiU50cN Jan 23 08:06:07 np0005593103 certmonger[38997]: IwaXLvoE0tioiF1T01fGlHL5H4iUDpJBpEnpEjnZ4liVy2r+7+ofvMVZPF477Q== Jan 23 08:06:07 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:06:07 np0005593103 certmonger[38997]: ". Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] No hooks set for pre-save command. Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] No hooks set for post-save command. Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:07 np0005593103 certmonger[42931]: Certificate in file "/etc/pki/tls/certs/ovn_dbs.crt" issued by CA and saved. Jan 23 08:06:07 np0005593103 certmonger[38997]: 2026-01-23 08:06:07 [38997] Wrote to /var/lib/certmonger/requests/20260123080606 Jan 23 08:06:08 np0005593103 python3[42947]: ansible-ansible.builtin.file Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig recurse=True state=directory selevel=s0 setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 08:06:08 np0005593103 python3[42963]: ansible-ansible.legacy.command Invoked with _raw_params=ovsdb-tool --help|grep -q election-timer _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:09 np0005593103 python3[43014]: ansible-ansible.legacy.stat Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 08:06:10 np0005593103 python3[43057]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155569.2621672-110531-39735764267942/source dest=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster mode=640 selevel=s0 setype=container_file_t follow=False _original_basename=ovn_cluster.j2 checksum=4974a1f6921c04920e9a65c28a143e531c1e7336 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None attributes=None Jan 23 08:06:10 np0005593103 python3[43087]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_north_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:11 np0005593103 python3[43104]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_south_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:11 np0005593103 python3[43121]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_northd _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:12 np0005593103 python3[43138]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:06:13 np0005593103 python3[43158]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:16 np0005593103 python3[43175]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:19 np0005593103 python3[43192]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:19 np0005593103 python3[43208]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:20 np0005593103 python3[43224]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:06:20 np0005593103 python3[43242]: ansible-certificate_request Invoked with name=ovn_controller dns=['np0005593103.internalapi.ooo.test'] principal=['ovn_controller/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:06:21 np0005593103 certmonger[43252]: " for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_controller/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:06:21 np0005593103 certmonger[43252]: " for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:06:21 np0005593103 certmonger[43252]: MIID5jCCAs4CAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:06:21 np0005593103 certmonger[43252]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtMs6xUvj Jan 23 08:06:21 np0005593103 certmonger[43252]: 9P6g+BspPI8NG0cBEijnJl+oW2Pu22w9ZcXJLxUyDnzUqeWEoTDm+rA1pf92gTdr Jan 23 08:06:21 np0005593103 certmonger[43252]: AAgUjv3wsY8x/AU5YjccvjiYNGk7BIc/+un7q0o/Q19elBCLW0SAUTRO+vl0E8IN Jan 23 08:06:21 np0005593103 certmonger[43252]: ixfyM9q9oG6gSpIaoNDRgfNNCEbHqO/Z2szwISz6HX+Q1HTcZzA7yyHQtxcVTz5y Jan 23 08:06:21 np0005593103 certmonger[43252]: qQBc/E7ZookO0/6H3XaLtc4y7y3wsf1p7se8gigXFn9Tr0N4I4zZcSXPewFn1SJg Jan 23 08:06:21 np0005593103 certmonger[43252]: v4DebBBDzUXr/X7NKOvfFgH7u9Z887Ki/m5xpCvgsTBZfhERxi34UETzpbpZ8+wj Jan 23 08:06:21 np0005593103 certmonger[43252]: qqU1SEwWOr0TSwIDAQABoIIBczArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:06:21 np0005593103 certmonger[43252]: ADIAMwAwADgAMAA2ADIAMTCCAUIGCSqGSIb3DQEJDjGCATMwggEvMAsGA1UdDwQE Jan 23 08:06:21 np0005593103 certmonger[43252]: AwIFoDCB0wYDVR0RBIHLMIHIgiFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:06:21 np0005593103 certmonger[43252]: LnRlc3SgSQYKKwYBBAGCNxQCA6A7DDlvdm5fY29udHJvbGxlci9ucDAwMDU1OTMx Jan 23 08:06:21 np0005593103 certmonger[43252]: MDMuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgWAYGKwYBBQICoE4wTKAK Jan 23 08:06:21 np0005593103 certmonger[43252]: GwhPT08uVEVTVKE+MDygAwIBAaE1MDMbDm92bl9jb250cm9sbGVyGyFucDAwMDU1 Jan 23 08:06:21 np0005593103 certmonger[43252]: OTMxMDMuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEG Jan 23 08:06:21 np0005593103 certmonger[43252]: CCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFKbL6fBcyWaCNuPSVTpM Jan 23 08:06:21 np0005593103 certmonger[43252]: o2J/gxfOMA0GCSqGSIb3DQEBCwUAA4IBAQAfKTwyHA5iASG3RI8qCBVbn5NOUDM2 Jan 23 08:06:21 np0005593103 certmonger[43252]: FTyrh19tb4qTq/3CqfC6wO4tXqE8yO5RjQDWhqId5YFTk+0cJHpOjomJ63qj8/v+ Jan 23 08:06:21 np0005593103 certmonger[43252]: rGL4YSpMaRJ1q7NEz7zrckvgp08YpkWpXIXgYUh7ZLJ4c+QXS3SKmbqiUQppMByB Jan 23 08:06:21 np0005593103 certmonger[43252]: SlL93aOOVXNJZtgld7+/Vv6WRz8MGRhwRMLYU+VXspz/c/3pBfqW5nGB0MBpjCt1 Jan 23 08:06:21 np0005593103 certmonger[43252]: OLWt2z+z2Ctfr83dPg5EHuGI8qI3v/b8l26/UqrlLQP4D4gVYBPCe692gdEJWxuu Jan 23 08:06:21 np0005593103 certmonger[43252]: O25K7icIQqrCFC50FB/yyhk5VkoWF//PRSzFFA7Lx+6rlq3CfFPeAQHk Jan 23 08:06:21 np0005593103 certmonger[43252]: -----END CERTIFICATE REQUEST----- Jan 23 08:06:21 np0005593103 certmonger[43252]: " for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtMs6xUvj9P6g+BspPI8NG0cBEijnJl+oW2Pu22w9ZcXJLxUyDnzUqeWEoTDm+rA1pf92gTdrAAgUjv3wsY8x/AU5YjccvjiYNGk7BIc/+un7q0o/Q19elBCLW0SAUTRO+vl0E8INixfyM9q9oG6gSpIaoNDRgfNNCEbHqO/Z2szwISz6HX+Q1HTcZzA7yyHQtxcVTz5yqQBc/E7ZookO0/6H3XaLtc4y7y3wsf1p7se8gigXFn9Tr0N4I4zZcSXPewFn1SJgv4DebBBDzUXr/X7NKOvfFgH7u9Z887Ki/m5xpCvgsTBZfhERxi34UETzpbpZ8+wjqqU1SEwWOr0TSwIDAQAB" for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:21 np0005593103 certmonger[43252]: 2026-01-23 08:06:21 [43252] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[43252]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:06:21 np0005593103 certmonger[43252]: Certificate: "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" Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Certificate submission still ongoing. Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Certificate submission attempt complete. Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Child status = 0. Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Child output: Jan 23 08:06:21 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:06:21 np0005593103 certmonger[38997]: MIIFeDCCA+CgAwIBAgIQFU/zBXZcI7KQE/NKSyUuMTANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:21 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:21 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDYyMVoXDTI4MDEyNDA4MDYyMVowPzERMA8GA1UECgwI Jan 23 08:06:21 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:21 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALTLOsVL4/T+oPgb Jan 23 08:06:21 np0005593103 certmonger[38997]: KTyPDRtHARIo5yZfqFtj7ttsPWXFyS8VMg581KnlhKEw5vqwNaX/doE3awAIFI79 Jan 23 08:06:21 np0005593103 certmonger[38997]: 8LGPMfwFOWI3HL44mDRpOwSHP/rp+6tKP0NfXpQQi1tEgFE0Tvr5dBPCDYsX8jPa Jan 23 08:06:21 np0005593103 certmonger[38997]: vaBuoEqSGqDQ0YHzTQhGx6jv2drM8CEs+h1/kNR03GcwO8sh0LcXFU8+cqkAXPxO Jan 23 08:06:21 np0005593103 certmonger[38997]: 2aKJDtP+h912i7XOMu8t8LH9ae7HvIIoFxZ/U69DeCOM2XElz3sBZ9UiYL+A3mwQ Jan 23 08:06:21 np0005593103 certmonger[38997]: Q81F6/1+zSjr3xYB+7vWfPOyov5ucaQr4LEwWX4REcYt+FBE86W6WfPsI6qlNUhM Jan 23 08:06:21 np0005593103 certmonger[38997]: Fjq9E0sCAwEAAaOCAfowggH2MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:21 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:21 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:21 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:21 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:21 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMNb Jan 23 08:06:21 np0005593103 certmonger[38997]: +zuLh7PTqWIjyP4uXSMceNWyMIHTBgNVHREEgcswgciCIW5wMDAwNTU5MzEwMy5p Jan 23 08:06:21 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9s Jan 23 08:06:21 np0005593103 certmonger[38997]: bGVyL25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBY Jan 23 08:06:21 np0005593103 certmonger[38997]: BgYrBgEFAgKgTjBMoAobCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRy Jan 23 08:06:21 np0005593103 certmonger[38997]: b2xsZXIbIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG Jan 23 08:06:21 np0005593103 certmonger[38997]: 9w0BAQsFAAOCAYEARI5diltOrs9uZ9ZQ9xYinV5gRuEQXFrG+lymCEGBMW23FKkT Jan 23 08:06:21 np0005593103 certmonger[38997]: 2G1P9p1QTv/TjjBAFMPo0OoNegOqlGJXHGbskomX4zU9TMlD8DbwXzbqPXghuenu Jan 23 08:06:21 np0005593103 certmonger[38997]: 1wItibmwAsZ/INcBAl5ZhyJZlWWGb0taLs6rKJF0dhICWMzftkEcWiFmLrq5kpeU Jan 23 08:06:21 np0005593103 certmonger[38997]: C0reCyoUsetBISIKMrq1cDJJed4jqFH0Nd63Oz5FVFTd3wS4oo1Oi+kkZUVqPKoD Jan 23 08:06:21 np0005593103 certmonger[38997]: l2ZxReAYPWtg9ft9g1e6vPnPzzdQNRMmmpGJ7Q1f1M5AjYD4RZochOEc4o9cvRT2 Jan 23 08:06:21 np0005593103 certmonger[38997]: QZizxF9sw7Mq2jkNCkV5R6JTYhc+yVN1Ix5y1AaogpkCLJEllKykK/nj2976N9CM Jan 23 08:06:21 np0005593103 certmonger[38997]: XobQLuScTQjQ2IOZJ+Qw/DnsbpPwq0/lrjP0P8X6liWFf9UUtg9MDAGnr5MO6Pv2 Jan 23 08:06:21 np0005593103 certmonger[38997]: AnDUeogfUpUSgGeyi4r64OoEXi0wuLPVQBWByTwAJHF4Wv8W5L9H9ZFXNz7ZruAP Jan 23 08:06:21 np0005593103 certmonger[38997]: k6MorJETIJYYpSHJ Jan 23 08:06:21 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:06:21 np0005593103 certmonger[38997]: " Jan 23 08:06:21 np0005593103 certmonger[43254]: 2026-01-23 08:06:21 [43254] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:06:21 np0005593103 certmonger[43254]: MIIFeDCCA+CgAwIBAgIQFU/zBXZcI7KQE/NKSyUuMTANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:21 np0005593103 certmonger[43254]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:21 np0005593103 certmonger[43254]: aXR5MB4XDTI2MDEyMzA4MDYyMVoXDTI4MDEyNDA4MDYyMVowPzERMA8GA1UECgwI Jan 23 08:06:21 np0005593103 certmonger[43254]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:21 np0005593103 certmonger[43254]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALTLOsVL4/T+oPgb Jan 23 08:06:21 np0005593103 certmonger[43254]: KTyPDRtHARIo5yZfqFtj7ttsPWXFyS8VMg581KnlhKEw5vqwNaX/doE3awAIFI79 Jan 23 08:06:21 np0005593103 certmonger[43254]: 8LGPMfwFOWI3HL44mDRpOwSHP/rp+6tKP0NfXpQQi1tEgFE0Tvr5dBPCDYsX8jPa Jan 23 08:06:21 np0005593103 certmonger[43254]: vaBuoEqSGqDQ0YHzTQhGx6jv2drM8CEs+h1/kNR03GcwO8sh0LcXFU8+cqkAXPxO Jan 23 08:06:21 np0005593103 certmonger[43254]: 2aKJDtP+h912i7XOMu8t8LH9ae7HvIIoFxZ/U69DeCOM2XElz3sBZ9UiYL+A3mwQ Jan 23 08:06:21 np0005593103 certmonger[43254]: Q81F6/1+zSjr3xYB+7vWfPOyov5ucaQr4LEwWX4REcYt+FBE86W6WfPsI6qlNUhM Jan 23 08:06:21 np0005593103 certmonger[43254]: Fjq9E0sCAwEAAaOCAfowggH2MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:21 np0005593103 certmonger[43254]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:21 np0005593103 certmonger[43254]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:21 np0005593103 certmonger[43254]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:21 np0005593103 certmonger[43254]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:21 np0005593103 certmonger[43254]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMNb Jan 23 08:06:21 np0005593103 certmonger[43254]: +zuLh7PTqWIjyP4uXSMceNWyMIHTBgNVHREEgcswgciCIW5wMDAwNTU5MzEwMy5p Jan 23 08:06:21 np0005593103 certmonger[43254]: bnRlcm5hbGFwaS5vb28udGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9s Jan 23 08:06:21 np0005593103 certmonger[43254]: bGVyL25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBY Jan 23 08:06:21 np0005593103 certmonger[43254]: BgYrBgEFAgKgTjBMoAobCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRy Jan 23 08:06:21 np0005593103 certmonger[43254]: b2xsZXIbIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG Jan 23 08:06:21 np0005593103 certmonger[43254]: 9w0BAQsFAAOCAYEARI5diltOrs9uZ9ZQ9xYinV5gRuEQXFrG+lymCEGBMW23FKkT Jan 23 08:06:21 np0005593103 certmonger[43254]: 2G1P9p1QTv/TjjBAFMPo0OoNegOqlGJXHGbskomX4zU9TMlD8DbwXzbqPXghuenu Jan 23 08:06:21 np0005593103 certmonger[43254]: 1wItibmwAsZ/INcBAl5ZhyJZlWWGb0taLs6rKJF0dhICWMzftkEcWiFmLrq5kpeU Jan 23 08:06:21 np0005593103 certmonger[43254]: C0reCyoUsetBISIKMrq1cDJJed4jqFH0Nd63Oz5FVFTd3wS4oo1Oi+kkZUVqPKoD Jan 23 08:06:21 np0005593103 certmonger[43254]: l2ZxReAYPWtg9ft9g1e6vPnPzzdQNRMmmpGJ7Q1f1M5AjYD4RZochOEc4o9cvRT2 Jan 23 08:06:21 np0005593103 certmonger[43254]: QZizxF9sw7Mq2jkNCkV5R6JTYhc+yVN1Ix5y1AaogpkCLJEllKykK/nj2976N9CM Jan 23 08:06:21 np0005593103 certmonger[43254]: XobQLuScTQjQ2IOZJ+Qw/DnsbpPwq0/lrjP0P8X6liWFf9UUtg9MDAGnr5MO6Pv2 Jan 23 08:06:21 np0005593103 certmonger[43254]: AnDUeogfUpUSgGeyi4r64OoEXi0wuLPVQBWByTwAJHF4Wv8W5L9H9ZFXNz7ZruAP Jan 23 08:06:21 np0005593103 certmonger[43254]: k6MorJETIJYYpSHJ Jan 23 08:06:21 np0005593103 certmonger[43254]: -----END CERTIFICATE----- Jan 23 08:06:21 np0005593103 certmonger[43254]: ". Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Certificate submission still ongoing. Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Certificate submission postprocessing complete. Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Child status = 0. Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Child output: Jan 23 08:06:21 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFeDCCA+CgAwIBAgIQFU/zBXZcI7KQE/NKSyUuMTANBgkqhkiG9w0BAQsFADAz\nMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y\naXR5MB4XDTI2MDEyMzA4MDYyMVoXDTI4MDEyNDA4MDYyMVowPzERMA8GA1UECgwI\nT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u\ndGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALTLOsVL4/T+oPgb\nKTyPDRtHARIo5yZfqFtj7ttsPWXFyS8VMg581KnlhKEw5vqwNaX/doE3awAIFI79\n8LGPMfwFOWI3HL44mDRpOwSHP/rp+6tKP0NfXpQQi1tEgFE0Tvr5dBPCDYsX8jPa\nvaBuoEqSGqDQ0YHzTQhGx6jv2drM8CEs+h1/kNR03GcwO8sh0LcXFU8+cqkAXPxO\n2aKJDtP+h912i7XOMu8t8LH9ae7HvIIoFxZ/U69DeCOM2XElz3sBZ9UiYL+A3mwQ\nQ81F6/1+zSjr3xYB+7vWfPOyov5ucaQr4LEwWX4REcYt+FBE86W6WfPsI6qlNUhM\nFjq9E0sCAwEAAaOCAfowggH2MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13\nLPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v\nb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF\nBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v\nb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw\nYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMNb\n+zuLh7PTqWIjyP4uXSMceNWyMIHTBgNVHREEgcswgciCIW5wMDAwNTU5MzEwMy5p\nbnRlcm5hbGFwaS5vb28udGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9s\nbGVyL25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBY\nBgYrBgEFAgKgTjBMoAobCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRy\nb2xsZXIbIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG\n9w0BAQsFAAOCAYEARI5diltOrs9uZ9ZQ9xYinV5gRuEQXFrG+lymCEGBMW23FKkT\n2G1P9p1QTv/TjjBAFMPo0OoNegOqlGJXHGbskomX4zU9TMlD8DbwXzbqPXghuenu\n1wItibmwAsZ/INcBAl5ZhyJZlWWGb0taLs6rKJF0dhICWMzftkEcWiFmLrq5kpeU\nC0reCyoUsetBISIKMrq1cDJJed4jqFH0Nd63Oz5FVFTd3wS4oo1Oi+kkZUVqPKoD\nl2ZxReAYPWtg9ft9g1e6vPnPzzdQNRMmmpGJ7Q1f1M5AjYD4RZochOEc4o9cvRT2\nQZizxF9sw7Mq2jkNCkV5R6JTYhc+yVN1Ix5y1AaogpkCLJEllKykK/nj2976N9CM\nXobQLuScTQjQ2IOZJ+Qw/DnsbpPwq0/lrjP0P8X6liWFf9UUtg9MDAGnr5MO6Pv2\nAnDUeogfUpUSgGeyi4r64OoEXi0wuLPVQBWByTwAJHF4Wv8W5L9H9ZFXNz7ZruAP\nk6MorJETIJYYpSHJ\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:06:21 np0005593103 certmonger[38997]: " Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:06:21 np0005593103 certmonger[38997]: MIIFeDCCA+CgAwIBAgIQFU/zBXZcI7KQE/NKSyUuMTANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:21 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:21 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDYyMVoXDTI4MDEyNDA4MDYyMVowPzERMA8GA1UECgwI Jan 23 08:06:21 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:21 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALTLOsVL4/T+oPgb Jan 23 08:06:21 np0005593103 certmonger[38997]: KTyPDRtHARIo5yZfqFtj7ttsPWXFyS8VMg581KnlhKEw5vqwNaX/doE3awAIFI79 Jan 23 08:06:21 np0005593103 certmonger[38997]: 8LGPMfwFOWI3HL44mDRpOwSHP/rp+6tKP0NfXpQQi1tEgFE0Tvr5dBPCDYsX8jPa Jan 23 08:06:21 np0005593103 certmonger[38997]: vaBuoEqSGqDQ0YHzTQhGx6jv2drM8CEs+h1/kNR03GcwO8sh0LcXFU8+cqkAXPxO Jan 23 08:06:21 np0005593103 certmonger[38997]: 2aKJDtP+h912i7XOMu8t8LH9ae7HvIIoFxZ/U69DeCOM2XElz3sBZ9UiYL+A3mwQ Jan 23 08:06:21 np0005593103 certmonger[38997]: Q81F6/1+zSjr3xYB+7vWfPOyov5ucaQr4LEwWX4REcYt+FBE86W6WfPsI6qlNUhM Jan 23 08:06:21 np0005593103 certmonger[38997]: Fjq9E0sCAwEAAaOCAfowggH2MB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:21 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:21 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:21 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:21 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:21 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMNb Jan 23 08:06:21 np0005593103 certmonger[38997]: +zuLh7PTqWIjyP4uXSMceNWyMIHTBgNVHREEgcswgciCIW5wMDAwNTU5MzEwMy5p Jan 23 08:06:21 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9s Jan 23 08:06:21 np0005593103 certmonger[38997]: bGVyL25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBY Jan 23 08:06:21 np0005593103 certmonger[38997]: BgYrBgEFAgKgTjBMoAobCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRy Jan 23 08:06:21 np0005593103 certmonger[38997]: b2xsZXIbIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG Jan 23 08:06:21 np0005593103 certmonger[38997]: 9w0BAQsFAAOCAYEARI5diltOrs9uZ9ZQ9xYinV5gRuEQXFrG+lymCEGBMW23FKkT Jan 23 08:06:21 np0005593103 certmonger[38997]: 2G1P9p1QTv/TjjBAFMPo0OoNegOqlGJXHGbskomX4zU9TMlD8DbwXzbqPXghuenu Jan 23 08:06:21 np0005593103 certmonger[38997]: 1wItibmwAsZ/INcBAl5ZhyJZlWWGb0taLs6rKJF0dhICWMzftkEcWiFmLrq5kpeU Jan 23 08:06:21 np0005593103 certmonger[38997]: C0reCyoUsetBISIKMrq1cDJJed4jqFH0Nd63Oz5FVFTd3wS4oo1Oi+kkZUVqPKoD Jan 23 08:06:21 np0005593103 certmonger[38997]: l2ZxReAYPWtg9ft9g1e6vPnPzzdQNRMmmpGJ7Q1f1M5AjYD4RZochOEc4o9cvRT2 Jan 23 08:06:21 np0005593103 certmonger[38997]: QZizxF9sw7Mq2jkNCkV5R6JTYhc+yVN1Ix5y1AaogpkCLJEllKykK/nj2976N9CM Jan 23 08:06:21 np0005593103 certmonger[38997]: XobQLuScTQjQ2IOZJ+Qw/DnsbpPwq0/lrjP0P8X6liWFf9UUtg9MDAGnr5MO6Pv2 Jan 23 08:06:21 np0005593103 certmonger[38997]: AnDUeogfUpUSgGeyi4r64OoEXi0wuLPVQBWByTwAJHF4Wv8W5L9H9ZFXNz7ZruAP Jan 23 08:06:21 np0005593103 certmonger[38997]: k6MorJETIJYYpSHJ Jan 23 08:06:21 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:06:21 np0005593103 certmonger[38997]: ". Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] No hooks set for pre-save command. Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] No hooks set for post-save command. Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:21 np0005593103 certmonger[43258]: Certificate in file "/etc/pki/tls/certs/ovn_controller.crt" issued by CA and saved. Jan 23 08:06:21 np0005593103 certmonger[38997]: 2026-01-23 08:06:21 [38997] Wrote to /var/lib/certmonger/requests/20260123080621 Jan 23 08:06:22 np0005593103 python3[43274]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:06:23 np0005593103 python3[43294]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:26 np0005593103 python3[43311]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:06:29 np0005593103 python3[43328]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:29 np0005593103 python3[43344]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:06:30 np0005593103 python3[43360]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:06:32 np0005593103 python3[43378]: ansible-certificate_request Invoked with name=rabbitmq dns=['np0005593103.internalapi.ooo.test'] principal=['rabbitmq/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'rabbitmq(-bundle-.*-[0-9]+)?')#012service_crt="/etc/pki/tls/certs/rabbitmq.crt"#012service_key="/etc/pki/tls/private/rabbitmq.key"#012if echo "$container_name" | grep -q "^rabbitmq-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_crt" "$service_key" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the cert at the mount-point#012 podman cp $service_crt "$container_name:/var/lib/kolla/config_files/src-tls/$service_crt"#012 # Refresh the key at the mount-point#012 podman cp $service_key "$container_name:/var/lib/kolla/config_files/src-tls/$service_key"#012 # Copy the new cert from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012 # Copy the new key from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012fi#012# Set appropriate permissions#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_crt"#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_key"#012# Trigger a pem cache clear in RabbitMQ to read the new certificates#012podman exec "$container_name" rabbitmqctl eval "ssl:clear_pem_cache()."#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:06:32 np0005593103 certmonger[43388]: " for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_REQ_PRINCIPAL" to "rabbitmq/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:06:32 np0005593103 certmonger[43388]: " for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:06:32 np0005593103 certmonger[43388]: MIID2jCCAsICAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:06:32 np0005593103 certmonger[43388]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApy16xqL+ Jan 23 08:06:32 np0005593103 certmonger[43388]: 4+LwCIc+SmGpYx/7RmE7Iq0sS/vXtr6bSIVMasNIdBP2VkIhQWqbIeuOvv6TuYv6 Jan 23 08:06:32 np0005593103 certmonger[43388]: puDlJ85NLHryVNltRoDUtJ7IDQguOiq00GDiKBUU8jRC4hG0xyY7Qe0Ux06olSmd Jan 23 08:06:32 np0005593103 certmonger[43388]: xAGCuhcR0ON1eyo2XSfIifqJbVaYSkgoNpYONyiZIBzS5rCZa8f1hXVKknODBmVh Jan 23 08:06:32 np0005593103 certmonger[43388]: BungmSwrAkm5CVsq+H8RMFWRJWxBuesGO2q1wOhJgnmkucgP2Xnrd2R0B2qIykiJ Jan 23 08:06:32 np0005593103 certmonger[43388]: PKsZrkqGag6SNwPFhZXTBEtt9BfyN9V7eZPgR37oBBmdO/hLxad91UCZIM/qKp6H Jan 23 08:06:32 np0005593103 certmonger[43388]: ATXdsD93dfz2VwIDAQABoIIBZzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:06:32 np0005593103 certmonger[43388]: ADIAMwAwADgAMAA2ADMAMjCCATYGCSqGSIb3DQEJDjGCAScwggEjMAsGA1UdDwQE Jan 23 08:06:32 np0005593103 certmonger[43388]: AwIFoDCBxwYDVR0RBIG/MIG8giFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:06:32 np0005593103 certmonger[43388]: LnRlc3SgQwYKKwYBBAGCNxQCA6A1DDNyYWJiaXRtcS9ucDAwMDU1OTMxMDMuaW50 Jan 23 08:06:32 np0005593103 certmonger[43388]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUgYGKwYBBQICoEgwRqAKGwhPT08u Jan 23 08:06:32 np0005593103 certmonger[43388]: VEVTVKE4MDagAwIBAaEvMC0bCHJhYmJpdG1xGyFucDAwMDU1OTMxMDMuaW50ZXJu Jan 23 08:06:32 np0005593103 certmonger[43388]: YWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwG Jan 23 08:06:32 np0005593103 certmonger[43388]: A1UdEwEB/wQCMAAwHQYDVR0OBBYEFLscqSs7ehOkNah0u00o1pdTL3rNMA0GCSqG Jan 23 08:06:32 np0005593103 certmonger[43388]: SIb3DQEBCwUAA4IBAQCHjr5E6hfDOuDX00tKvbJLtLQMws+Cd6GN2w9i7Usg4qOf Jan 23 08:06:32 np0005593103 certmonger[43388]: ssQCYIx0eq150TKERpe1kA2aMC7vmpUzHcw28Xdqq38p8B7bxJERsq3aOQrukzrM Jan 23 08:06:32 np0005593103 certmonger[43388]: H3vg29zaY8D31Y4OZj0AfL8FkXNQXIo7ejqqiAmyPBopBQ4LMlq41iO+FyyI4DCg Jan 23 08:06:32 np0005593103 certmonger[43388]: 4kCWfoHEV0EdFr1Ee7DcBjdGX5Busp+wfHDYiN3p5vgRFatfhgNyeFSA1a5lj2Ih Jan 23 08:06:32 np0005593103 certmonger[43388]: MFV90X3xrWPPP20dwkIrzo1JllZZTRZtHt+i0HZp9z9sIxNtDdwHWP5hbMbi2vPO Jan 23 08:06:32 np0005593103 certmonger[43388]: Ix6E+ZIzKciP5XS/vOdI5oetjLHNZnS3CePc/a7e Jan 23 08:06:32 np0005593103 certmonger[43388]: -----END CERTIFICATE REQUEST----- Jan 23 08:06:32 np0005593103 certmonger[43388]: " for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApy16xqL+4+LwCIc+SmGpYx/7RmE7Iq0sS/vXtr6bSIVMasNIdBP2VkIhQWqbIeuOvv6TuYv6puDlJ85NLHryVNltRoDUtJ7IDQguOiq00GDiKBUU8jRC4hG0xyY7Qe0Ux06olSmdxAGCuhcR0ON1eyo2XSfIifqJbVaYSkgoNpYONyiZIBzS5rCZa8f1hXVKknODBmVhBungmSwrAkm5CVsq+H8RMFWRJWxBuesGO2q1wOhJgnmkucgP2Xnrd2R0B2qIykiJPKsZrkqGag6SNwPFhZXTBEtt9BfyN9V7eZPgR37oBBmdO/hLxad91UCZIM/qKp6HATXdsD93dfz2VwIDAQAB" for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:32 np0005593103 certmonger[43388]: 2026-01-23 08:06:32 [43388] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:06:32 np0005593103 certmonger[38997]: 2026-01-23 08:06:32 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:32 np0005593103 certmonger[43388]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:06:33 np0005593103 certmonger[43388]: Certificate: "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" Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Certificate submission still ongoing. Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Certificate submission attempt complete. Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Child status = 0. Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Child output: Jan 23 08:06:33 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:06:33 np0005593103 certmonger[38997]: MIIFbDCCA9SgAwIBAgIQUsI5m3vDlO79CZ9wPcUZGTANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:33 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:33 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDYzM1oXDTI4MDEyNDA4MDYzM1owPzERMA8GA1UECgwI Jan 23 08:06:33 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:33 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKctesai/uPi8AiH Jan 23 08:06:33 np0005593103 certmonger[38997]: PkphqWMf+0ZhOyKtLEv717a+m0iFTGrDSHQT9lZCIUFqmyHrjr7+k7mL+qbg5SfO Jan 23 08:06:33 np0005593103 certmonger[38997]: TSx68lTZbUaA1LSeyA0ILjoqtNBg4igVFPI0QuIRtMcmO0HtFMdOqJUpncQBgroX Jan 23 08:06:33 np0005593103 certmonger[38997]: EdDjdXsqNl0nyIn6iW1WmEpIKDaWDjcomSAc0uawmWvH9YV1SpJzgwZlYQbp4Jks Jan 23 08:06:33 np0005593103 certmonger[38997]: KwJJuQlbKvh/ETBVkSVsQbnrBjtqtcDoSYJ5pLnID9l563dkdAdqiMpIiTyrGa5K Jan 23 08:06:33 np0005593103 certmonger[38997]: hmoOkjcDxYWV0wRLbfQX8jfVe3mT4Ed+6AQZnTv4S8WnfdVAmSDP6iqehwE13bA/ Jan 23 08:06:33 np0005593103 certmonger[38997]: d3X89lcCAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:33 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:33 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:33 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:33 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:33 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFD2/ Jan 23 08:06:33 np0005593103 certmonger[38997]: 5JkriAgHQPRpBj8wHr1kLC6WMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU5MzEwMy5p Jan 23 08:06:33 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w Jan 23 08:06:33 np0005593103 certmonger[38997]: MDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF Jan 23 08:06:33 np0005593103 certmonger[38997]: AgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw Jan 23 08:06:33 np0005593103 certmonger[38997]: NTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Jan 23 08:06:33 np0005593103 certmonger[38997]: LU6wK25JjX2urud3RkcWqaagSkRoD3yOVB+NP/xSVzL6BvLoFpOxc0M1aYlTFmF+ Jan 23 08:06:33 np0005593103 certmonger[38997]: 9g2zTeadkcKF0FHHhXXLUCpdX8+ZJeFUNWx2luXFxf1AghTP+czIakyS2zTAT+cA Jan 23 08:06:33 np0005593103 certmonger[38997]: sr7l2y+ZIj7JZP1/IDN+//FvqVemvvWODSBionV6sSby2yx6pvB2mPCYx7yTZTw8 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2kR7OyHBCIcLJWV4XuPL55E+OHt9ctkVjWQj1lYCeblgPJC/9omkNWkSDXSWLVAI Jan 23 08:06:33 np0005593103 certmonger[38997]: Rn8YxZ8lZozNXXpGKstxS/W1RCpwWEk9eHnpmKt/dOHCyBXAWiPwHpvPEXQF7p2v Jan 23 08:06:33 np0005593103 certmonger[38997]: BI5gwsVi2HTOknQFjYNCttcToRxoLvynbRe4eEbmj4VETDjkWiR7WQTlnJUHAnoB Jan 23 08:06:33 np0005593103 certmonger[38997]: 1T9m6iZHjI0N2yzkEd0v9ZqVyjsT96BHwzinaRlRsMg6tsJe8kCAjoiifgXLuVFa Jan 23 08:06:33 np0005593103 certmonger[38997]: iLcugbB3qeJoZ5un20pEpo6qS+TthU2LxBh7cxRpC4hze5MVztb4Ps4KUbfzQo31 Jan 23 08:06:33 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:06:33 np0005593103 certmonger[38997]: " Jan 23 08:06:33 np0005593103 certmonger[43390]: 2026-01-23 08:06:33 [43390] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:06:33 np0005593103 certmonger[43390]: MIIFbDCCA9SgAwIBAgIQUsI5m3vDlO79CZ9wPcUZGTANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:33 np0005593103 certmonger[43390]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:33 np0005593103 certmonger[43390]: aXR5MB4XDTI2MDEyMzA4MDYzM1oXDTI4MDEyNDA4MDYzM1owPzERMA8GA1UECgwI Jan 23 08:06:33 np0005593103 certmonger[43390]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:33 np0005593103 certmonger[43390]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKctesai/uPi8AiH Jan 23 08:06:33 np0005593103 certmonger[43390]: PkphqWMf+0ZhOyKtLEv717a+m0iFTGrDSHQT9lZCIUFqmyHrjr7+k7mL+qbg5SfO Jan 23 08:06:33 np0005593103 certmonger[43390]: TSx68lTZbUaA1LSeyA0ILjoqtNBg4igVFPI0QuIRtMcmO0HtFMdOqJUpncQBgroX Jan 23 08:06:33 np0005593103 certmonger[43390]: EdDjdXsqNl0nyIn6iW1WmEpIKDaWDjcomSAc0uawmWvH9YV1SpJzgwZlYQbp4Jks Jan 23 08:06:33 np0005593103 certmonger[43390]: KwJJuQlbKvh/ETBVkSVsQbnrBjtqtcDoSYJ5pLnID9l563dkdAdqiMpIiTyrGa5K Jan 23 08:06:33 np0005593103 certmonger[43390]: hmoOkjcDxYWV0wRLbfQX8jfVe3mT4Ed+6AQZnTv4S8WnfdVAmSDP6iqehwE13bA/ Jan 23 08:06:33 np0005593103 certmonger[43390]: d3X89lcCAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:33 np0005593103 certmonger[43390]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:33 np0005593103 certmonger[43390]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:33 np0005593103 certmonger[43390]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:33 np0005593103 certmonger[43390]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:33 np0005593103 certmonger[43390]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFD2/ Jan 23 08:06:33 np0005593103 certmonger[43390]: 5JkriAgHQPRpBj8wHr1kLC6WMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU5MzEwMy5p Jan 23 08:06:33 np0005593103 certmonger[43390]: bnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w Jan 23 08:06:33 np0005593103 certmonger[43390]: MDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF Jan 23 08:06:33 np0005593103 certmonger[43390]: AgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw Jan 23 08:06:33 np0005593103 certmonger[43390]: NTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Jan 23 08:06:33 np0005593103 certmonger[43390]: LU6wK25JjX2urud3RkcWqaagSkRoD3yOVB+NP/xSVzL6BvLoFpOxc0M1aYlTFmF+ Jan 23 08:06:33 np0005593103 certmonger[43390]: 9g2zTeadkcKF0FHHhXXLUCpdX8+ZJeFUNWx2luXFxf1AghTP+czIakyS2zTAT+cA Jan 23 08:06:33 np0005593103 certmonger[43390]: sr7l2y+ZIj7JZP1/IDN+//FvqVemvvWODSBionV6sSby2yx6pvB2mPCYx7yTZTw8 Jan 23 08:06:33 np0005593103 certmonger[43390]: 2kR7OyHBCIcLJWV4XuPL55E+OHt9ctkVjWQj1lYCeblgPJC/9omkNWkSDXSWLVAI Jan 23 08:06:33 np0005593103 certmonger[43390]: Rn8YxZ8lZozNXXpGKstxS/W1RCpwWEk9eHnpmKt/dOHCyBXAWiPwHpvPEXQF7p2v Jan 23 08:06:33 np0005593103 certmonger[43390]: BI5gwsVi2HTOknQFjYNCttcToRxoLvynbRe4eEbmj4VETDjkWiR7WQTlnJUHAnoB Jan 23 08:06:33 np0005593103 certmonger[43390]: 1T9m6iZHjI0N2yzkEd0v9ZqVyjsT96BHwzinaRlRsMg6tsJe8kCAjoiifgXLuVFa Jan 23 08:06:33 np0005593103 certmonger[43390]: iLcugbB3qeJoZ5un20pEpo6qS+TthU2LxBh7cxRpC4hze5MVztb4Ps4KUbfzQo31 Jan 23 08:06:33 np0005593103 certmonger[43390]: -----END CERTIFICATE----- Jan 23 08:06:33 np0005593103 certmonger[43390]: ". Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Certificate submission still ongoing. Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Certificate submission postprocessing complete. Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Child status = 0. Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Child output: Jan 23 08:06:33 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:06:33 np0005593103 certmonger[38997]: " Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:06:33 np0005593103 certmonger[38997]: MIIFbDCCA9SgAwIBAgIQUsI5m3vDlO79CZ9wPcUZGTANBgkqhkiG9w0BAQsFADAz Jan 23 08:06:33 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:06:33 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDYzM1oXDTI4MDEyNDA4MDYzM1owPzERMA8GA1UECgwI Jan 23 08:06:33 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:06:33 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKctesai/uPi8AiH Jan 23 08:06:33 np0005593103 certmonger[38997]: PkphqWMf+0ZhOyKtLEv717a+m0iFTGrDSHQT9lZCIUFqmyHrjr7+k7mL+qbg5SfO Jan 23 08:06:33 np0005593103 certmonger[38997]: TSx68lTZbUaA1LSeyA0ILjoqtNBg4igVFPI0QuIRtMcmO0HtFMdOqJUpncQBgroX Jan 23 08:06:33 np0005593103 certmonger[38997]: EdDjdXsqNl0nyIn6iW1WmEpIKDaWDjcomSAc0uawmWvH9YV1SpJzgwZlYQbp4Jks Jan 23 08:06:33 np0005593103 certmonger[38997]: KwJJuQlbKvh/ETBVkSVsQbnrBjtqtcDoSYJ5pLnID9l563dkdAdqiMpIiTyrGa5K Jan 23 08:06:33 np0005593103 certmonger[38997]: hmoOkjcDxYWV0wRLbfQX8jfVe3mT4Ed+6AQZnTv4S8WnfdVAmSDP6iqehwE13bA/ Jan 23 08:06:33 np0005593103 certmonger[38997]: d3X89lcCAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:06:33 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:06:33 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:06:33 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:06:33 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:06:33 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFD2/ Jan 23 08:06:33 np0005593103 certmonger[38997]: 5JkriAgHQPRpBj8wHr1kLC6WMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU5MzEwMy5p Jan 23 08:06:33 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25w Jan 23 08:06:33 np0005593103 certmonger[38997]: MDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEF Jan 23 08:06:33 np0005593103 certmonger[38997]: AgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAw Jan 23 08:06:33 np0005593103 certmonger[38997]: NTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Jan 23 08:06:33 np0005593103 certmonger[38997]: LU6wK25JjX2urud3RkcWqaagSkRoD3yOVB+NP/xSVzL6BvLoFpOxc0M1aYlTFmF+ Jan 23 08:06:33 np0005593103 certmonger[38997]: 9g2zTeadkcKF0FHHhXXLUCpdX8+ZJeFUNWx2luXFxf1AghTP+czIakyS2zTAT+cA Jan 23 08:06:33 np0005593103 certmonger[38997]: sr7l2y+ZIj7JZP1/IDN+//FvqVemvvWODSBionV6sSby2yx6pvB2mPCYx7yTZTw8 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2kR7OyHBCIcLJWV4XuPL55E+OHt9ctkVjWQj1lYCeblgPJC/9omkNWkSDXSWLVAI Jan 23 08:06:33 np0005593103 certmonger[38997]: Rn8YxZ8lZozNXXpGKstxS/W1RCpwWEk9eHnpmKt/dOHCyBXAWiPwHpvPEXQF7p2v Jan 23 08:06:33 np0005593103 certmonger[38997]: BI5gwsVi2HTOknQFjYNCttcToRxoLvynbRe4eEbmj4VETDjkWiR7WQTlnJUHAnoB Jan 23 08:06:33 np0005593103 certmonger[38997]: 1T9m6iZHjI0N2yzkEd0v9ZqVyjsT96BHwzinaRlRsMg6tsJe8kCAjoiifgXLuVFa Jan 23 08:06:33 np0005593103 certmonger[38997]: iLcugbB3qeJoZ5un20pEpo6qS+TthU2LxBh7cxRpC4hze5MVztb4Ps4KUbfzQo31 Jan 23 08:06:33 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:06:33 np0005593103 certmonger[38997]: ". Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] No hooks set for pre-save command. Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:33 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:33 np0005593103 certmonger[43492]: Certificate in file "/etc/pki/tls/certs/rabbitmq.crt" issued by CA and saved. Jan 23 08:06:33 np0005593103 certmonger[38997]: 2026-01-23 08:06:33 [38997] Wrote to /var/lib/certmonger/requests/20260123080632 Jan 23 08:06:34 np0005593103 python3[43508]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:41 np0005593103 podman[43509]: 2026-01-23 08:06:34.377444269 +0000 UTC m=+0.044494765 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 08:06:41 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:42 np0005593103 python3[43575]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 cluster.common.tag/rabbitmq:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:06:42 np0005593103 podman[43576]: 2026-01-23 08:06:42.406578238 +0000 UTC m=+0.032764865 image tag cf4ab8456a3abe57a7f04fa72c2968e2d1110502686fa60ebe007d8aced3db7d cluster.common.tag/rabbitmq:pcmklatest Jan 23 08:06:42 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:42 np0005593103 python3[43603]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:42 np0005593103 python3[43603]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 --format json Jan 23 08:06:42 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:42 np0005593103 python3[43603]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 -q --tls-verify=false Jan 23 08:06:46 np0005593103 podman[43616]: 2026-01-23 08:06:43.009335632 +0000 UTC m=+0.026368876 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 Jan 23 08:06:46 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:46 np0005593103 python3[43603]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a616d7a557ed72e2cb3c2f707314a11eec1313a010753921e54a824d721f2301 --format json Jan 23 08:06:46 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:47 np0005593103 python3[43705]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:47 np0005593103 python3[43705]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 --format json Jan 23 08:06:47 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:47 np0005593103 python3[43705]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 -q --tls-verify=false Jan 23 08:06:51 np0005593103 podman[43717]: 2026-01-23 08:06:47.347632407 +0000 UTC m=+0.042430613 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 Jan 23 08:06:51 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:51 np0005593103 python3[43705]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7ad54cee06bf23c7a73c6382f7e21cdf8ca093b59b1eba9d085eff95472a36e6 --format json Jan 23 08:06:51 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:52 np0005593103 python3[43798]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:52 np0005593103 python3[43798]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 --format json Jan 23 08:06:52 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:52 np0005593103 python3[43798]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 -q --tls-verify=false Jan 23 08:06:54 np0005593103 podman[43810]: 2026-01-23 08:06:52.150515226 +0000 UTC m=+0.042958819 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 Jan 23 08:06:54 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:54 np0005593103 python3[43798]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8ece98bf1089a0d3fdab5c6a92a2dd64fc4b0f8b7a05f2bfebd5d06b0149991f --format json Jan 23 08:06:54 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:54 np0005593103 python3[43886]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:54 np0005593103 python3[43886]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 --format json Jan 23 08:06:55 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:55 np0005593103 python3[43886]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 -q --tls-verify=false Jan 23 08:06:58 np0005593103 podman[43899]: 2026-01-23 08:06:55.12138815 +0000 UTC m=+0.067136321 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 08:06:58 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:58 np0005593103 python3[43886]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8bd08f386db64f8894158012c608a496eb287cf99090b41e503a9bc591b481e6 --format json Jan 23 08:06:58 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:58 np0005593103 python3[43977]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:06:58 np0005593103 python3[43977]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 --format json Jan 23 08:06:58 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:06:58 np0005593103 python3[43977]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 -q --tls-verify=false Jan 23 08:07:00 np0005593103 podman[43990]: 2026-01-23 08:06:58.596435754 +0000 UTC m=+0.046322158 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 08:07:00 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:00 np0005593103 python3[43977]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect bac901955dcf7a32a493c6ef724c092009bbc18467858aa8c55e916b8c2b2b8f --format json Jan 23 08:07:00 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:01 np0005593103 python3[44068]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:01 np0005593103 python3[44068]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 --format json Jan 23 08:07:01 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:01 np0005593103 python3[44068]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 -q --tls-verify=false Jan 23 08:07:02 np0005593103 podman[44082]: 2026-01-23 08:07:01.217265041 +0000 UTC m=+0.044192293 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 08:07:02 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:02 np0005593103 python3[44068]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b13c44df76d5b3bb87652b20507cc40d62568630b0249319c13c07bbb18c36c3 --format json Jan 23 08:07:02 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:03 np0005593103 python3[44148]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:03 np0005593103 python3[44148]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 --format json Jan 23 08:07:03 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:03 np0005593103 python3[44148]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 -q --tls-verify=false Jan 23 08:07:04 np0005593103 podman[44162]: 2026-01-23 08:07:03.221158887 +0000 UTC m=+0.041606004 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 08:07:04 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:04 np0005593103 python3[44148]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect cf4ab8456a3abe57a7f04fa72c2968e2d1110502686fa60ebe007d8aced3db7d --format json Jan 23 08:07:04 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:05 np0005593103 python3[44227]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:05 np0005593103 python3[44227]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 --format json Jan 23 08:07:05 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:05 np0005593103 python3[44227]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 -q --tls-verify=false Jan 23 08:07:09 np0005593103 podman[44240]: 2026-01-23 08:07:05.31585265 +0000 UTC m=+0.041496071 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 08:07:09 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:09 np0005593103 python3[44227]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b9d7c6447d3e11e4b7bc4c1a8872a5471a9020b0347f9e0a44060d9b2823bfe3 --format json Jan 23 08:07:09 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:10 np0005593103 python3[44317]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:10 np0005593103 python3[44317]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 --format json Jan 23 08:07:10 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:10 np0005593103 python3[44317]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 -q --tls-verify=false Jan 23 08:07:17 np0005593103 podman[44330]: 2026-01-23 08:07:10.361679121 +0000 UTC m=+0.039411785 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Jan 23 08:07:17 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:17 np0005593103 python3[44317]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 0b85a6c916779a2364dabc601af2849008f8a7bb090497d470f183826d209742 --format json Jan 23 08:07:17 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:18 np0005593103 python3[44410]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:18 np0005593103 python3[44410]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 --format json Jan 23 08:07:18 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:18 np0005593103 python3[44410]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 -q --tls-verify=false Jan 23 08:07:20 np0005593103 podman[44422]: 2026-01-23 08:07:18.363984296 +0000 UTC m=+0.044329426 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 Jan 23 08:07:20 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:20 np0005593103 python3[44410]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8bb56ea60f206582ac0e8abc44419c975a910cdb0dffbce91bd34eb53d7f0cc0 --format json Jan 23 08:07:20 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:20 np0005593103 python3[44500]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:20 np0005593103 python3[44500]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 --format json Jan 23 08:07:20 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:20 np0005593103 python3[44500]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 -q --tls-verify=false Jan 23 08:07:30 np0005593103 podman[44513]: 2026-01-23 08:07:20.889949207 +0000 UTC m=+0.043911294 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 08:07:30 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:30 np0005593103 python3[44500]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 2d473f0d6d0f3d389f26cf8e584cb2217e1a9f089f6623537c64c4ebe593ba39 --format json Jan 23 08:07:30 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:30 np0005593103 python3[44592]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:30 np0005593103 python3[44592]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 --format json Jan 23 08:07:30 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:30 np0005593103 python3[44592]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 -q --tls-verify=false Jan 23 08:07:38 np0005593103 podman[44604]: 2026-01-23 08:07:30.562586499 +0000 UTC m=+0.043738301 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Jan 23 08:07:38 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:38 np0005593103 python3[44592]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 59c0f32bbd0d880fb7671f77c7f9fe7eba6371b76ea661a3802be79175c9cf97 --format json Jan 23 08:07:38 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:38 np0005593103 python3[44694]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:38 np0005593103 python3[44694]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 --format json Jan 23 08:07:38 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:38 np0005593103 python3[44694]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 -q --tls-verify=false Jan 23 08:07:46 np0005593103 podman[44707]: 2026-01-23 08:07:38.67988987 +0000 UTC m=+0.043961387 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Jan 23 08:07:46 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:46 np0005593103 python3[44694]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d33cd7cbe30b5f4b1aaa37c443e1d6a0ab7f5cf2aaa69525a32fda95900b6c10 --format json Jan 23 08:07:46 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:46 np0005593103 python3[44835]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:46 np0005593103 python3[44835]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 --format json Jan 23 08:07:47 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:47 np0005593103 python3[44835]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 -q --tls-verify=false Jan 23 08:07:51 np0005593103 podman[44849]: 2026-01-23 08:07:47.078469706 +0000 UTC m=+0.041928842 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Jan 23 08:07:51 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:51 np0005593103 python3[44835]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 431c4154374af6b6d532165560f80c367b832346d0d836548da79db297917d4e --format json Jan 23 08:07:51 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:51 np0005593103 python3[44993]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:51 np0005593103 python3[44993]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 --format json Jan 23 08:07:51 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:51 np0005593103 python3[44993]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 -q --tls-verify=false Jan 23 08:07:53 np0005593103 podman[45006]: 2026-01-23 08:07:51.539088518 +0000 UTC m=+0.041652515 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Jan 23 08:07:53 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:53 np0005593103 python3[44993]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d91d671d486b16c1c793bf9221f9d0576c18fc58940981d37833abeb53fd5301 --format json Jan 23 08:07:53 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:54 np0005593103 python3[45084]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:07:54 np0005593103 python3[45084]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 --format json Jan 23 08:07:54 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:07:54 np0005593103 python3[45084]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 -q --tls-verify=false Jan 23 08:08:03 np0005593103 podman[45097]: 2026-01-23 08:07:54.358917859 +0000 UTC m=+0.035337248 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Jan 23 08:08:03 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:03 np0005593103 python3[45084]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a579d4fdbda482f87d090081f6e846234e7904d62181a063e2d9b35577177b9f --format json Jan 23 08:08:03 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:04 np0005593103 python3[45438]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:04 np0005593103 python3[45438]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 --format json Jan 23 08:08:04 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:04 np0005593103 python3[45438]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 -q --tls-verify=false Jan 23 08:08:14 np0005593103 podman[45450]: 2026-01-23 08:08:04.161053245 +0000 UTC m=+0.040290486 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 08:08:14 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:14 np0005593103 python3[45438]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ea72abdd68f9a2d0af97778644413f0df0dab9d453b865185a199c5c12f4e55d --format json Jan 23 08:08:14 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:15 np0005593103 python3[45985]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:15 np0005593103 python3[45985]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 --format json Jan 23 08:08:15 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:15 np0005593103 python3[45985]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 -q --tls-verify=false Jan 23 08:08:19 np0005593103 podman[45998]: 2026-01-23 08:08:15.38305613 +0000 UTC m=+0.040770609 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Jan 23 08:08:19 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:19 np0005593103 python3[45985]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 835b9fac535c710ebcd7589f0ff14498479122b0c8b5628384d8a3491dd522b8 --format json Jan 23 08:08:19 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:19 np0005593103 python3[46078]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:19 np0005593103 python3[46078]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 --format json Jan 23 08:08:19 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:19 np0005593103 python3[46078]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 -q --tls-verify=false Jan 23 08:08:23 np0005593103 podman[46090]: 2026-01-23 08:08:19.827080474 +0000 UTC m=+0.044907726 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Jan 23 08:08:23 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:23 np0005593103 python3[46078]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ff1f91308b6fbe9092c5f1e2edb9f228bf32084b8df80485aea656b2849547d7 --format json Jan 23 08:08:23 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:23 np0005593103 python3[46175]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:23 np0005593103 python3[46175]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 --format json Jan 23 08:08:24 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:24 np0005593103 python3[46175]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 -q --tls-verify=false Jan 23 08:08:27 np0005593103 podman[46294]: 2026-01-23 08:08:24.088058093 +0000 UTC m=+0.044762061 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 Jan 23 08:08:27 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:27 np0005593103 python3[46175]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 93ea0c0505cfd89e3e321f4bacb12a17fef6f01eb6141df9dbcc45821d42917f --format json Jan 23 08:08:27 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:27 np0005593103 python3[46383]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:27 np0005593103 python3[46383]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 --format json Jan 23 08:08:28 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:28 np0005593103 python3[46383]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 -q --tls-verify=false Jan 23 08:08:29 np0005593103 podman[46396]: 2026-01-23 08:08:28.081857117 +0000 UTC m=+0.044185536 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Jan 23 08:08:29 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:29 np0005593103 python3[46383]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 01162f309a727f9f16ef893d348a6167be101f9c31f2a9a381f4a430ffc3b21a --format json Jan 23 08:08:30 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:30 np0005593103 python3[46462]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:30 np0005593103 python3[46462]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 --format json Jan 23 08:08:30 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:30 np0005593103 python3[46462]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 -q --tls-verify=false Jan 23 08:08:32 np0005593103 podman[46474]: 2026-01-23 08:08:30.577583404 +0000 UTC m=+0.035505931 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Jan 23 08:08:32 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:32 np0005593103 python3[46462]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ccd22ddeb69c8f3a05d2d3f97d21f9fa64c6f2bc3a156f93212de7feacea314f --format json Jan 23 08:08:32 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:32 np0005593103 python3[46540]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:32 np0005593103 python3[46540]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 --format json Jan 23 08:08:32 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:32 np0005593103 python3[46540]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 -q --tls-verify=false Jan 23 08:08:38 np0005593103 podman[46552]: 2026-01-23 08:08:32.864801807 +0000 UTC m=+0.049513385 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Jan 23 08:08:38 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:38 np0005593103 python3[46540]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 24976907b2c2553304119aba5731a800204d664feed24ca9eb7f2b4c7d81016b --format json Jan 23 08:08:38 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:39 np0005593103 python3[46770]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:39 np0005593103 python3[46770]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 --format json Jan 23 08:08:39 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:39 np0005593103 python3[46770]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 -q --tls-verify=false Jan 23 08:08:41 np0005593103 podman[46783]: 2026-01-23 08:08:39.409317065 +0000 UTC m=+0.045036959 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Jan 23 08:08:41 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:41 np0005593103 python3[46770]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 57163a7b21fdbb804a27897cb6e6052a5e5c7a339c45d663e80b52375a760dcf --format json Jan 23 08:08:41 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:41 np0005593103 python3[46862]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:41 np0005593103 python3[46862]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 --format json Jan 23 08:08:42 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:42 np0005593103 python3[46862]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 -q --tls-verify=false Jan 23 08:08:43 np0005593103 podman[46874]: 2026-01-23 08:08:42.078798708 +0000 UTC m=+0.047463892 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Jan 23 08:08:43 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:43 np0005593103 python3[46862]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b9682dee21d7c5836da0f5094cc87a67e8c855fb08692e50824e31ad6f3d7b7f --format json Jan 23 08:08:43 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:43 np0005593103 python3[46940]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:43 np0005593103 python3[46940]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 --format json Jan 23 08:08:43 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:43 np0005593103 python3[46940]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 -q --tls-verify=false Jan 23 08:08:50 np0005593103 podman[46952]: 2026-01-23 08:08:43.89190341 +0000 UTC m=+0.045405428 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Jan 23 08:08:50 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:50 np0005593103 python3[46940]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 076d82a27d63c8328729ed27ceb4291585ae18d017befe6fe353df7aa11715ae --format json Jan 23 08:08:50 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:51 np0005593103 python3[47028]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:51 np0005593103 python3[47028]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 --format json Jan 23 08:08:51 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:51 np0005593103 python3[47028]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 -q --tls-verify=false Jan 23 08:08:55 np0005593103 podman[47040]: 2026-01-23 08:08:51.196535442 +0000 UTC m=+0.040698526 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 08:08:55 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:55 np0005593103 python3[47028]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a2405b5037b4ecda355ba679b0452a03af79396a3962d913c65d6e971ae04ad9 --format json Jan 23 08:08:55 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:55 np0005593103 python3[47128]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:55 np0005593103 python3[47128]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 --format json Jan 23 08:08:55 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:55 np0005593103 python3[47128]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 -q --tls-verify=false Jan 23 08:08:58 np0005593103 podman[47140]: 2026-01-23 08:08:55.925991737 +0000 UTC m=+0.041631510 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Jan 23 08:08:58 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:58 np0005593103 python3[47128]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d9a3b5ac0adeeb65fb1be6ff5d0045b0f5c343dcfec19ba43a878e23890d2b6e --format json Jan 23 08:08:58 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:58 np0005593103 python3[47216]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:08:58 np0005593103 python3[47216]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 --format json Jan 23 08:08:58 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:08:58 np0005593103 python3[47216]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 -q --tls-verify=false Jan 23 08:09:01 np0005593103 podman[47229]: 2026-01-23 08:08:58.780697531 +0000 UTC m=+0.048236771 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Jan 23 08:09:01 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:01 np0005593103 python3[47216]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 9bc6fb316da179dd124d351484d6f1112e635a607defab7b2cc5463bbb6bf086 --format json Jan 23 08:09:01 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:02 np0005593103 python3[47374]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:02 np0005593103 python3[47374]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 --format json Jan 23 08:09:02 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:02 np0005593103 python3[47374]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 -q --tls-verify=false Jan 23 08:09:04 np0005593103 podman[47387]: 2026-01-23 08:09:02.192759359 +0000 UTC m=+0.057541063 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Jan 23 08:09:04 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:04 np0005593103 python3[47374]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e6e981540e553415b2d6eda490d7683db07164af2e7a0af8245623900338a4d6 --format json Jan 23 08:09:04 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:05 np0005593103 python3[47463]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:05 np0005593103 python3[47463]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 --format json Jan 23 08:09:05 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:05 np0005593103 python3[47463]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 -q --tls-verify=false Jan 23 08:09:07 np0005593103 podman[47476]: 2026-01-23 08:09:05.226371236 +0000 UTC m=+0.049400236 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 08:09:07 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:07 np0005593103 python3[47463]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 5710c4c9977d2ec6efe2229a91f94fd5ac38b06ccb63c09ee3ce15dd3c2f8756 --format json Jan 23 08:09:07 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:08 np0005593103 python3[47553]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:08 np0005593103 python3[47553]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 --format json Jan 23 08:09:08 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:08 np0005593103 python3[47553]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 -q --tls-verify=false Jan 23 08:09:10 np0005593103 podman[47565]: 2026-01-23 08:09:08.131101232 +0000 UTC m=+0.043884710 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Jan 23 08:09:10 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:10 np0005593103 python3[47553]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ede96ea916c936d09aefbff926e4cdbe1be4aeb7a9a1581064259698ac9d6d38 --format json Jan 23 08:09:10 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:10 np0005593103 python3[47643]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:10 np0005593103 python3[47643]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 --format json Jan 23 08:09:10 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:10 np0005593103 python3[47643]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 -q --tls-verify=false Jan 23 08:09:13 np0005593103 podman[47655]: 2026-01-23 08:09:10.925869911 +0000 UTC m=+0.051041369 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Jan 23 08:09:13 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:13 np0005593103 python3[47643]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 87ee88cbf01fb42e0b22747072843bcca6130a90eda4de6e74b3ccd847bb4040 --format json Jan 23 08:09:13 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:13 np0005593103 python3[47733]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:13 np0005593103 python3[47733]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 --format json Jan 23 08:09:13 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:13 np0005593103 python3[47733]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 -q --tls-verify=false Jan 23 08:09:15 np0005593103 podman[47745]: 2026-01-23 08:09:13.994836349 +0000 UTC m=+0.038906847 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 Jan 23 08:09:15 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:15 np0005593103 python3[47733]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d51fd7ce5400a7c4800bb82d80a52f917f3accf6aa602b7c20c427b481ad1e6b --format json Jan 23 08:09:15 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:15 np0005593103 python3[47824]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:15 np0005593103 python3[47824]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 --format json Jan 23 08:09:16 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:16 np0005593103 python3[47824]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 -q --tls-verify=false Jan 23 08:09:18 np0005593103 podman[47836]: 2026-01-23 08:09:16.075860023 +0000 UTC m=+0.045931104 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 Jan 23 08:09:18 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:18 np0005593103 python3[47824]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 6888a3a7246be9d1931c9a82c3e6b98c4ec30e2e363b80647ef78110ef87f229 --format json Jan 23 08:09:18 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:18 np0005593103 python3[47914]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:18 np0005593103 python3[47914]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 --format json Jan 23 08:09:18 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:18 np0005593103 python3[47914]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 -q --tls-verify=false Jan 23 08:09:21 np0005593103 podman[47926]: 2026-01-23 08:09:18.89907453 +0000 UTC m=+0.047013203 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 Jan 23 08:09:21 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:21 np0005593103 python3[47914]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect bca5bfd4d7b21ee858ad76cbe422ed1ea846fc4024ae502e9ed52eba39883d76 --format json Jan 23 08:09:21 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:22 np0005593103 python3[48005]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:22 np0005593103 python3[48005]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 --format json Jan 23 08:09:22 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:22 np0005593103 python3[48005]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 -q --tls-verify=false Jan 23 08:09:24 np0005593103 podman[48019]: 2026-01-23 08:09:22.429021586 +0000 UTC m=+0.044608328 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Jan 23 08:09:24 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:24 np0005593103 python3[48005]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 4d6ea8e2ec83f47f1713b4a93aa453a808e455a73bda48fb8ecdf020c5ccd5cb --format json Jan 23 08:09:25 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:25 np0005593103 python3[48096]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Jan 23 08:09:25 np0005593103 python3[48096]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 --format json Jan 23 08:09:25 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:25 np0005593103 python3[48096]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 -q --tls-verify=false Jan 23 08:09:27 np0005593103 podman[48109]: 2026-01-23 08:09:25.514925383 +0000 UTC m=+0.052224950 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Jan 23 08:09:27 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:27 np0005593103 python3[48096]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7c77ef06363cc542abd59edc23ca348c84dc9f8a4ac2248a34728abb4e15057d --format json Jan 23 08:09:27 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:28 np0005593103 python3[48192]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 08:09:29 np0005593103 python3[48212]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:09:32 np0005593103 python3[48229]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 08:09:35 np0005593103 python3[48246]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:09:36 np0005593103 python3[48262]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:09:36 np0005593103 python3[48278]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 08:09:37 np0005593103 python3[48296]: ansible-certificate_request Invoked with name=redis dns=['np0005593103.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['redis/np0005593103.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep redis_tls_proxy)#012service_crt="/etc/pki/tls/certs/redis.crt"#012service_key="/etc/pki/tls/private/redis.key"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown memcached:memcached "$service_crt"#012podman exec "$container_name" chown memcached:memcached "$service_key"#012# Trigger a reload for stunnel to read the new certificate#012podman exec pkill -o -HUP stunnel#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593103.internalapi.ooo.test" for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593103.internalapi.ooo.test Jan 23 08:09:37 np0005593103 certmonger[48306]: overcloud.internalapi.ooo.test Jan 23 08:09:37 np0005593103 certmonger[48306]: " for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_REQ_PRINCIPAL" to "redis/np0005593103.internalapi.ooo.test@OOO.TEST Jan 23 08:09:37 np0005593103 certmonger[48306]: " for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 08:09:37 np0005593103 certmonger[48306]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAzLmludGVybmFsYXBp Jan 23 08:09:37 np0005593103 certmonger[48306]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr8ZdBDki Jan 23 08:09:37 np0005593103 certmonger[48306]: tFKteIkI4XEsJz3OcmXQn3QSDkYgzo6O7GXnrEOLv9svtiC2meAd7BiSKoC5HrEi Jan 23 08:09:37 np0005593103 certmonger[48306]: AtHh9NM8zOS6q2i42HSI0tVeGihqDGZZO5HvF3GvtrYkiV+JmZnQhv7cVGpyC93A Jan 23 08:09:37 np0005593103 certmonger[48306]: 6s46Srq+mc3tGl62c4yjjBC5jWNI6KdFdIzv+OdF/iOy0xz1iyYyuzHSKXb0Seyr Jan 23 08:09:37 np0005593103 certmonger[48306]: eMsR+HYHWIyC8R6EHeu7D7KvEBfUmeMhICVB8Y1sNbYHNbAyv8zLg6NpzRZtR0+h Jan 23 08:09:37 np0005593103 certmonger[48306]: pSq1m8dOjXVuYra/SYQCUft8ix7Jv2jFEHYvQtae8xOrW5EOiZL1TVw8iHcZgf37 Jan 23 08:09:37 np0005593103 certmonger[48306]: omn9yVXfaxOmVQIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 08:09:37 np0005593103 certmonger[48306]: ADIAMwAwADgAMAA5ADMANzCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Jan 23 08:09:37 np0005593103 certmonger[48306]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU1OTMxMDMuaW50ZXJuYWxhcGkub29v Jan 23 08:09:37 np0005593103 certmonger[48306]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Jan 23 08:09:37 np0005593103 certmonger[48306]: FAIDoDIMMHJlZGlzL25wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdEBP Jan 23 08:09:37 np0005593103 certmonger[48306]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Jan 23 08:09:37 np0005593103 certmonger[48306]: cmVkaXMbIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Jan 23 08:09:37 np0005593103 certmonger[48306]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Jan 23 08:09:37 np0005593103 certmonger[48306]: Y8l1Au2Mzyso966KuJmSuz+p3ZEwDQYJKoZIhvcNAQELBQADggEBAKobflGEKcrW Jan 23 08:09:37 np0005593103 certmonger[48306]: 4OtcenWwTog+e+o4ioRasLEpdMw4uQ6bclnP39ZfqYPNx7LiWIInQziSmOTP1G55 Jan 23 08:09:37 np0005593103 certmonger[48306]: +rUyUOrZYpNbA8tAqV4DFtGLboEeqnYJ0QeneMx4ISYHui4ww1sST64h9khIWFXB Jan 23 08:09:37 np0005593103 certmonger[48306]: XHWm+KUsWrrRf8QkPxcK76q/XK0U4NmFrPIXtuDvFii/2100Z9wHPIutwE0dqmyM Jan 23 08:09:37 np0005593103 certmonger[48306]: om6iGflm89X8rRke2OyhwJycaxfAuU+RCjVZMQ+wozJDjPt6slO+fM0lWtfz8UQn Jan 23 08:09:37 np0005593103 certmonger[48306]: oYN3lZNQtM/MqCOCAtpNw3KoN/6GwTpRoL+u18GwsqTXj4s9tYEagQDVlWk6br1P Jan 23 08:09:37 np0005593103 certmonger[48306]: 8111uJvoEiA= Jan 23 08:09:37 np0005593103 certmonger[48306]: -----END CERTIFICATE REQUEST----- Jan 23 08:09:37 np0005593103 certmonger[48306]: " for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr8ZdBDkitFKteIkI4XEsJz3OcmXQn3QSDkYgzo6O7GXnrEOLv9svtiC2meAd7BiSKoC5HrEiAtHh9NM8zOS6q2i42HSI0tVeGihqDGZZO5HvF3GvtrYkiV+JmZnQhv7cVGpyC93A6s46Srq+mc3tGl62c4yjjBC5jWNI6KdFdIzv+OdF/iOy0xz1iyYyuzHSKXb0SeyreMsR+HYHWIyC8R6EHeu7D7KvEBfUmeMhICVB8Y1sNbYHNbAyv8zLg6NpzRZtR0+hpSq1m8dOjXVuYra/SYQCUft8ix7Jv2jFEHYvQtae8xOrW5EOiZL1TVw8iHcZgf37omn9yVXfaxOmVQIDAQAB" for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 08:09:37 np0005593103 certmonger[48306]: 2026-01-23 08:09:37 [48306] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 08:09:37 np0005593103 certmonger[38997]: 2026-01-23 08:09:37 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[48306]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 08:09:38 np0005593103 certmonger[48306]: Certificate: "MIIFhjCCA+6gAwIBAgIQQIxxG29Ogc0jUr22QV5BIjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI2MDEyMzA4MDkzOFoXDTI4MDEyNDA4MDkzOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK/GXQQ5IrRSrXiJCOFxLCc9znJl0J90Eg5GIM6Ojuxl56xDi7/bL7YgtpngHewYkiqAuR6xIgLR4fTTPMzkuqtouNh0iNLVXhooagxmWTuR7xdxr7a2JIlfiZmZ0Ib+3FRqcgvdwOrOOkq6vpnN7RpetnOMo4wQuY1jSOinRXSM7/jnRf4jstMc9YsmMrsx0il29Ensq3jLEfh2B1iMgvEehB3ruw+yrxAX1JnjISAlQfGNbDW2BzWwMr/My4Ojac0WbUdPoaUqtZvHTo11bmK2v0mEAlH7fIseyb9oxRB2L0LWnvMTq1uRDomS9U1cPIh3GYH9+6Jp/clV32sTplUCAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNWLWpja9Woho6dxoDX+4LwDq4BeMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcUAgOgMgwwcmVkaXMvbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVyZWRpcxshbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA96oyaSSsTWkpkQEi035rFWe7EcXhLqyysiWEmdMsdI7idM2ieuHYQrLFAxe398359ZMRTTVXQLV3kqOZPd804gY4kyqoR3gVVRrQoPLBZdEIItx8unIST+24DLAtNimMwJ2/XI9Je6/dGxMTeMcrT4bhaKmQq7Uk75jQeuWGna2WcoYcfPseVd960nfas19+N7pPwYIgpM5JD7GYy+FuuvmjIY4tOoZN75ip3GcJNOHu0L3/2tUVC9tRAqzJIlpmy1OwQ69bTi5yNtZ37Vf/zk9H28uiF+S4GbefOcIXNde8Gn4ip5gD5sQ1eE+bjyfvHndpX2NQY9I89MHPHLamsZml1j5JLR8bHwkG4syEati4zU8wVjNTmUCphlrg2YKxayU9Abb5JPb+afDXTQU51lM96dQAynJZfHHcUO/SblVE5StCDsL27e0IYDDbbjOHNnB4fpWpHhZeMD8p2UNaHfUm3I9LB7zFqIKLo7mJkzw6D8R5G/n+ROHw+wwzz+Gw=" Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Certificate submission still ongoing. Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Certificate submission attempt complete. Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Child status = 0. Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Child output: Jan 23 08:09:38 np0005593103 certmonger[38997]: "-----BEGIN CERTIFICATE----- Jan 23 08:09:38 np0005593103 certmonger[38997]: MIIFhjCCA+6gAwIBAgIQQIxxG29Ogc0jUr22QV5BIjANBgkqhkiG9w0BAQsFADAz Jan 23 08:09:38 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:09:38 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDkzOFoXDTI4MDEyNDA4MDkzOFowPzERMA8GA1UECgwI Jan 23 08:09:38 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:09:38 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK/GXQQ5IrRSrXiJ Jan 23 08:09:38 np0005593103 certmonger[38997]: COFxLCc9znJl0J90Eg5GIM6Ojuxl56xDi7/bL7YgtpngHewYkiqAuR6xIgLR4fTT Jan 23 08:09:38 np0005593103 certmonger[38997]: PMzkuqtouNh0iNLVXhooagxmWTuR7xdxr7a2JIlfiZmZ0Ib+3FRqcgvdwOrOOkq6 Jan 23 08:09:38 np0005593103 certmonger[38997]: vpnN7RpetnOMo4wQuY1jSOinRXSM7/jnRf4jstMc9YsmMrsx0il29Ensq3jLEfh2 Jan 23 08:09:38 np0005593103 certmonger[38997]: B1iMgvEehB3ruw+yrxAX1JnjISAlQfGNbDW2BzWwMr/My4Ojac0WbUdPoaUqtZvH Jan 23 08:09:38 np0005593103 certmonger[38997]: To11bmK2v0mEAlH7fIseyb9oxRB2L0LWnvMTq1uRDomS9U1cPIh3GYH9+6Jp/clV Jan 23 08:09:38 np0005593103 certmonger[38997]: 32sTplUCAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:09:38 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:09:38 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:09:38 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:09:38 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:09:38 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNWL Jan 23 08:09:38 np0005593103 certmonger[38997]: Wpja9Woho6dxoDX+4LwDq4BeMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMy5p Jan 23 08:09:38 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Jan 23 08:09:38 np0005593103 certmonger[38997]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwcmVkaXMvbnAwMDA1NTkzMTAzLmludGVybmFs Jan 23 08:09:38 np0005593103 certmonger[38997]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Jan 23 08:09:38 np0005593103 certmonger[38997]: NTAzoAMCAQGhLDAqGwVyZWRpcxshbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9v Jan 23 08:09:38 np0005593103 certmonger[38997]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA96oyaSSsTWkpkQEi035rFWe7EcXhL Jan 23 08:09:38 np0005593103 certmonger[38997]: qyysiWEmdMsdI7idM2ieuHYQrLFAxe398359ZMRTTVXQLV3kqOZPd804gY4kyqoR Jan 23 08:09:38 np0005593103 certmonger[38997]: 3gVVRrQoPLBZdEIItx8unIST+24DLAtNimMwJ2/XI9Je6/dGxMTeMcrT4bhaKmQq Jan 23 08:09:38 np0005593103 certmonger[38997]: 7Uk75jQeuWGna2WcoYcfPseVd960nfas19+N7pPwYIgpM5JD7GYy+FuuvmjIY4tO Jan 23 08:09:38 np0005593103 certmonger[38997]: oZN75ip3GcJNOHu0L3/2tUVC9tRAqzJIlpmy1OwQ69bTi5yNtZ37Vf/zk9H28uiF Jan 23 08:09:38 np0005593103 certmonger[38997]: +S4GbefOcIXNde8Gn4ip5gD5sQ1eE+bjyfvHndpX2NQY9I89MHPHLamsZml1j5JL Jan 23 08:09:38 np0005593103 certmonger[38997]: R8bHwkG4syEati4zU8wVjNTmUCphlrg2YKxayU9Abb5JPb+afDXTQU51lM96dQAy Jan 23 08:09:38 np0005593103 certmonger[38997]: nJZfHHcUO/SblVE5StCDsL27e0IYDDbbjOHNnB4fpWpHhZeMD8p2UNaHfUm3I9LB Jan 23 08:09:38 np0005593103 certmonger[38997]: 7zFqIKLo7mJkzw6D8R5G/n+ROHw+wwzz+Gw= Jan 23 08:09:38 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:09:38 np0005593103 certmonger[38997]: " Jan 23 08:09:38 np0005593103 certmonger[48308]: 2026-01-23 08:09:38 [48308] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 08:09:38 np0005593103 certmonger[48308]: MIIFhjCCA+6gAwIBAgIQQIxxG29Ogc0jUr22QV5BIjANBgkqhkiG9w0BAQsFADAz Jan 23 08:09:38 np0005593103 certmonger[48308]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:09:38 np0005593103 certmonger[48308]: aXR5MB4XDTI2MDEyMzA4MDkzOFoXDTI4MDEyNDA4MDkzOFowPzERMA8GA1UECgwI Jan 23 08:09:38 np0005593103 certmonger[48308]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:09:38 np0005593103 certmonger[48308]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK/GXQQ5IrRSrXiJ Jan 23 08:09:38 np0005593103 certmonger[48308]: COFxLCc9znJl0J90Eg5GIM6Ojuxl56xDi7/bL7YgtpngHewYkiqAuR6xIgLR4fTT Jan 23 08:09:38 np0005593103 certmonger[48308]: PMzkuqtouNh0iNLVXhooagxmWTuR7xdxr7a2JIlfiZmZ0Ib+3FRqcgvdwOrOOkq6 Jan 23 08:09:38 np0005593103 certmonger[48308]: vpnN7RpetnOMo4wQuY1jSOinRXSM7/jnRf4jstMc9YsmMrsx0il29Ensq3jLEfh2 Jan 23 08:09:38 np0005593103 certmonger[48308]: B1iMgvEehB3ruw+yrxAX1JnjISAlQfGNbDW2BzWwMr/My4Ojac0WbUdPoaUqtZvH Jan 23 08:09:38 np0005593103 certmonger[48308]: To11bmK2v0mEAlH7fIseyb9oxRB2L0LWnvMTq1uRDomS9U1cPIh3GYH9+6Jp/clV Jan 23 08:09:38 np0005593103 certmonger[48308]: 32sTplUCAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:09:38 np0005593103 certmonger[48308]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:09:38 np0005593103 certmonger[48308]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:09:38 np0005593103 certmonger[48308]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:09:38 np0005593103 certmonger[48308]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:09:38 np0005593103 certmonger[48308]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNWL Jan 23 08:09:38 np0005593103 certmonger[48308]: Wpja9Woho6dxoDX+4LwDq4BeMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMy5p Jan 23 08:09:38 np0005593103 certmonger[48308]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Jan 23 08:09:38 np0005593103 certmonger[48308]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwcmVkaXMvbnAwMDA1NTkzMTAzLmludGVybmFs Jan 23 08:09:38 np0005593103 certmonger[48308]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Jan 23 08:09:38 np0005593103 certmonger[48308]: NTAzoAMCAQGhLDAqGwVyZWRpcxshbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9v Jan 23 08:09:38 np0005593103 certmonger[48308]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA96oyaSSsTWkpkQEi035rFWe7EcXhL Jan 23 08:09:38 np0005593103 certmonger[48308]: qyysiWEmdMsdI7idM2ieuHYQrLFAxe398359ZMRTTVXQLV3kqOZPd804gY4kyqoR Jan 23 08:09:38 np0005593103 certmonger[48308]: 3gVVRrQoPLBZdEIItx8unIST+24DLAtNimMwJ2/XI9Je6/dGxMTeMcrT4bhaKmQq Jan 23 08:09:38 np0005593103 certmonger[48308]: 7Uk75jQeuWGna2WcoYcfPseVd960nfas19+N7pPwYIgpM5JD7GYy+FuuvmjIY4tO Jan 23 08:09:38 np0005593103 certmonger[48308]: oZN75ip3GcJNOHu0L3/2tUVC9tRAqzJIlpmy1OwQ69bTi5yNtZ37Vf/zk9H28uiF Jan 23 08:09:38 np0005593103 certmonger[48308]: +S4GbefOcIXNde8Gn4ip5gD5sQ1eE+bjyfvHndpX2NQY9I89MHPHLamsZml1j5JL Jan 23 08:09:38 np0005593103 certmonger[48308]: R8bHwkG4syEati4zU8wVjNTmUCphlrg2YKxayU9Abb5JPb+afDXTQU51lM96dQAy Jan 23 08:09:38 np0005593103 certmonger[48308]: nJZfHHcUO/SblVE5StCDsL27e0IYDDbbjOHNnB4fpWpHhZeMD8p2UNaHfUm3I9LB Jan 23 08:09:38 np0005593103 certmonger[48308]: 7zFqIKLo7mJkzw6D8R5G/n+ROHw+wwzz+Gw= Jan 23 08:09:38 np0005593103 certmonger[48308]: -----END CERTIFICATE----- Jan 23 08:09:38 np0005593103 certmonger[48308]: ". Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Certificate submission still ongoing. Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Certificate submission postprocessing complete. Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Child status = 0. Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Child output: Jan 23 08:09:38 np0005593103 certmonger[38997]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n7zFqIKLo7mJkzw6D8R5G/n+ROHw+wwzz+Gw=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 08:09:38 np0005593103 certmonger[38997]: " Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 08:09:38 np0005593103 certmonger[38997]: MIIFhjCCA+6gAwIBAgIQQIxxG29Ogc0jUr22QV5BIjANBgkqhkiG9w0BAQsFADAz Jan 23 08:09:38 np0005593103 certmonger[38997]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 08:09:38 np0005593103 certmonger[38997]: aXR5MB4XDTI2MDEyMzA4MDkzOFoXDTI4MDEyNDA4MDkzOFowPzERMA8GA1UECgwI Jan 23 08:09:38 np0005593103 certmonger[38997]: T09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU5MzEwMy5pbnRlcm5hbGFwaS5vb28u Jan 23 08:09:38 np0005593103 certmonger[38997]: dGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK/GXQQ5IrRSrXiJ Jan 23 08:09:38 np0005593103 certmonger[38997]: COFxLCc9znJl0J90Eg5GIM6Ojuxl56xDi7/bL7YgtpngHewYkiqAuR6xIgLR4fTT Jan 23 08:09:38 np0005593103 certmonger[38997]: PMzkuqtouNh0iNLVXhooagxmWTuR7xdxr7a2JIlfiZmZ0Ib+3FRqcgvdwOrOOkq6 Jan 23 08:09:38 np0005593103 certmonger[38997]: vpnN7RpetnOMo4wQuY1jSOinRXSM7/jnRf4jstMc9YsmMrsx0il29Ensq3jLEfh2 Jan 23 08:09:38 np0005593103 certmonger[38997]: B1iMgvEehB3ruw+yrxAX1JnjISAlQfGNbDW2BzWwMr/My4Ojac0WbUdPoaUqtZvH Jan 23 08:09:38 np0005593103 certmonger[38997]: To11bmK2v0mEAlH7fIseyb9oxRB2L0LWnvMTq1uRDomS9U1cPIh3GYH9+6Jp/clV Jan 23 08:09:38 np0005593103 certmonger[38997]: 32sTplUCAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13 Jan 23 08:09:38 np0005593103 certmonger[38997]: LPI4MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5v Jan 23 08:09:38 np0005593103 certmonger[38997]: b28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEF Jan 23 08:09:38 np0005593103 certmonger[38997]: BQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5v Jan 23 08:09:38 np0005593103 certmonger[38997]: b28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlw Jan 23 08:09:38 np0005593103 certmonger[38997]: YWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNWL Jan 23 08:09:38 np0005593103 certmonger[38997]: Wpja9Woho6dxoDX+4LwDq4BeMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU5MzEwMy5p Jan 23 08:09:38 np0005593103 certmonger[38997]: bnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50 Jan 23 08:09:38 np0005593103 certmonger[38997]: ZXN0oEAGCisGAQQBgjcUAgOgMgwwcmVkaXMvbnAwMDA1NTkzMTAzLmludGVybmFs Jan 23 08:09:38 np0005593103 certmonger[38997]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1Sh Jan 23 08:09:38 np0005593103 certmonger[38997]: NTAzoAMCAQGhLDAqGwVyZWRpcxshbnAwMDA1NTkzMTAzLmludGVybmFsYXBpLm9v Jan 23 08:09:38 np0005593103 certmonger[38997]: by50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA96oyaSSsTWkpkQEi035rFWe7EcXhL Jan 23 08:09:38 np0005593103 certmonger[38997]: qyysiWEmdMsdI7idM2ieuHYQrLFAxe398359ZMRTTVXQLV3kqOZPd804gY4kyqoR Jan 23 08:09:38 np0005593103 certmonger[38997]: 3gVVRrQoPLBZdEIItx8unIST+24DLAtNimMwJ2/XI9Je6/dGxMTeMcrT4bhaKmQq Jan 23 08:09:38 np0005593103 certmonger[38997]: 7Uk75jQeuWGna2WcoYcfPseVd960nfas19+N7pPwYIgpM5JD7GYy+FuuvmjIY4tO Jan 23 08:09:38 np0005593103 certmonger[38997]: oZN75ip3GcJNOHu0L3/2tUVC9tRAqzJIlpmy1OwQ69bTi5yNtZ37Vf/zk9H28uiF Jan 23 08:09:38 np0005593103 certmonger[38997]: +S4GbefOcIXNde8Gn4ip5gD5sQ1eE+bjyfvHndpX2NQY9I89MHPHLamsZml1j5JL Jan 23 08:09:38 np0005593103 certmonger[38997]: R8bHwkG4syEati4zU8wVjNTmUCphlrg2YKxayU9Abb5JPb+afDXTQU51lM96dQAy Jan 23 08:09:38 np0005593103 certmonger[38997]: nJZfHHcUO/SblVE5StCDsL27e0IYDDbbjOHNnB4fpWpHhZeMD8p2UNaHfUm3I9LB Jan 23 08:09:38 np0005593103 certmonger[38997]: 7zFqIKLo7mJkzw6D8R5G/n+ROHw+wwzz+Gw= Jan 23 08:09:38 np0005593103 certmonger[38997]: -----END CERTIFICATE----- Jan 23 08:09:38 np0005593103 certmonger[38997]: ". Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Certificate issued (0 chain certificates, 0 roots). Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] No hooks set for pre-save command. Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:38 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:38 np0005593103 certmonger[48384]: Certificate in file "/etc/pki/tls/certs/redis.crt" issued by CA and saved. Jan 23 08:09:38 np0005593103 certmonger[38997]: 2026-01-23 08:09:38 [38997] Wrote to /var/lib/certmonger/requests/20260123080937 Jan 23 08:09:39 np0005593103 python3[48400]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:09:40 np0005593103 podman[48401]: 2026-01-23 08:09:39.352439364 +0000 UTC m=+0.044532286 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 08:09:40 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:41 np0005593103 python3[48454]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 cluster.common.tag/redis:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:09:41 np0005593103 podman[48455]: 2026-01-23 08:09:41.404091286 +0000 UTC m=+0.050263399 image tag b9d7c6447d3e11e4b7bc4c1a8872a5471a9020b0347f9e0a44060d9b2823bfe3 cluster.common.tag/redis:pcmklatest Jan 23 08:09:41 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 08:09:41 np0005593103 python3[48483]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 08:09:42 np0005593103 python3[48532]: ansible-ansible.legacy.stat Invoked with path=/etc/rsyslog.d/openstack-swift.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 08:09:42 np0005593103 python3[48575]: ansible-ansible.legacy.copy Invoked with dest=/etc/rsyslog.d/openstack-swift.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155782.0257185-115350-2357374190807/source _original_basename=tmp3bofchsy follow=False checksum=c046f7cecbacf1ea879045a0e157e300a2726c73 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 08:09:43 np0005593103 python3[48605]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 08:09:43 np0005593103 systemd[1]: Stopping System Logging Service... Jan 23 08:09:43 np0005593103 rsyslogd[40165]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40165" x-info="https://www.rsyslog.com"] exiting on signal 15. Jan 23 08:09:43 np0005593103 systemd[1]: rsyslog.service: Deactivated successfully. Jan 23 08:09:43 np0005593103 systemd[1]: Stopped System Logging Service. Jan 23 08:09:43 np0005593103 systemd[1]: Starting System Logging Service... Jan 23 08:09:43 np0005593103 rsyslogd[48608]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="48608" x-info="https://www.rsyslog.com"] start Jan 23 08:09:43 np0005593103 systemd[1]: Started System Logging Service. Jan 23 08:09:43 np0005593103 rsyslogd[48608]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 08:09:43 np0005593103 python3[48627]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 08:09:45 np0005593103 ansible-async_wrapper.py[48799]: Invoked with 196301315047 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155785.1505234-115478-182859397434557/AnsiballZ_command.py _ Jan 23 08:09:45 np0005593103 ansible-async_wrapper.py[48802]: Starting module and watcher Jan 23 08:09:45 np0005593103 ansible-async_wrapper.py[48802]: Start watching 48803 (3600) Jan 23 08:09:45 np0005593103 ansible-async_wrapper.py[48803]: Start module (48803) Jan 23 08:09:45 np0005593103 ansible-async_wrapper.py[48799]: Return async_wrapper task started. Jan 23 08:09:46 np0005593103 python3[48823]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:09:50 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3600) Jan 23 08:09:51 np0005593103 puppet-user[48820]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 08:09:51 np0005593103 puppet-user[48820]: (file: /etc/puppet/hiera.yaml) Jan 23 08:09:51 np0005593103 puppet-user[48820]: Warning: Undefined variable '::deploy_config_name'; Jan 23 08:09:51 np0005593103 puppet-user[48820]: (file & line not available) Jan 23 08:09:51 np0005593103 puppet-user[48820]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 08:09:51 np0005593103 puppet-user[48820]: (file & line not available) Jan 23 08:09:51 np0005593103 puppet-user[48820]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Jan 23 08:09:52 np0005593103 puppet-user[48820]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Jan 23 08:09:52 np0005593103 puppet-user[48820]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.36 seconds Jan 23 08:09:52 np0005593103 sssd_nss[38696]: Enumeration requested but not enabled Jan 23 08:09:52 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Exec[directory-create-etc-my.cnf.d]/returns: executed successfully Jan 23 08:09:52 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 08:09:53 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 08:09:55 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3595) Jan 23 08:09:56 np0005593103 python3[48964]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:00 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3590) Jan 23 08:10:04 np0005593103 dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Jan 23 08:10:05 np0005593103 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 08:10:05 np0005593103 systemd[1]: Starting man-db-cache-update.service... Jan 23 08:10:05 np0005593103 systemd[1]: Reloading. Jan 23 08:10:05 np0005593103 systemd-sysv-generator[49122]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:05 np0005593103 systemd-rc-local-generator[49119]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:05 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:05 np0005593103 systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 08:10:05 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3585) Jan 23 08:10:06 np0005593103 rhsm-service[6579]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 08:10:06 np0005593103 python3[50769]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:06 np0005593103 systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 08:10:06 np0005593103 systemd[1]: Finished man-db-cache-update.service. Jan 23 08:10:06 np0005593103 systemd[1]: man-db-cache-update.service: Consumed 1.850s CPU time. Jan 23 08:10:06 np0005593103 systemd[1]: run-rfc466b9ad1214a48b8fd5a1420a93dd6.service: Deactivated successfully. Jan 23 08:10:06 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Pacemaker::Install/Package[pacemaker]/ensure: created Jan 23 08:10:10 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3580) Jan 23 08:10:12 np0005593103 systemd[1]: Reloading. Jan 23 08:10:12 np0005593103 systemd-rc-local-generator[50900]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:12 np0005593103 systemd-sysv-generator[50904]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:12 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:12 np0005593103 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 08:10:12 np0005593103 systemd[1]: Starting man-db-cache-update.service... Jan 23 08:10:12 np0005593103 systemd[1]: Reloading. Jan 23 08:10:13 np0005593103 systemd-rc-local-generator[50955]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:13 np0005593103 systemd-sysv-generator[50960]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:13 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:13 np0005593103 systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 08:10:13 np0005593103 systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 08:10:13 np0005593103 systemd[1]: Finished man-db-cache-update.service. Jan 23 08:10:13 np0005593103 systemd[1]: run-r7fecfc25b0064cdc8e579309350ce3f0.service: Deactivated successfully. Jan 23 08:10:14 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Pacemaker::Install/Package[pcs]/ensure: created Jan 23 08:10:14 np0005593103 systemd[1]: Reloading. Jan 23 08:10:14 np0005593103 systemd-sysv-generator[51072]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:14 np0005593103 systemd-rc-local-generator[51068]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:14 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:14 np0005593103 systemd[1]: Reloading. Jan 23 08:10:14 np0005593103 systemd-rc-local-generator[51107]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:14 np0005593103 systemd-sysv-generator[51112]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:14 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:14 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Pacemaker::Service/Service[corosync]/enable: enable changed 'false' to 'true' Jan 23 08:10:14 np0005593103 systemd[1]: Reloading. Jan 23 08:10:15 np0005593103 systemd-sysv-generator[51150]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:15 np0005593103 systemd-rc-local-generator[51147]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:15 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:15 np0005593103 systemd[1]: Reloading. Jan 23 08:10:15 np0005593103 systemd-rc-local-generator[51182]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:15 np0005593103 systemd-sysv-generator[51185]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:15 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:15 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Pacemaker::Service/Service[pacemaker]/enable: enable changed 'false' to 'true' Jan 23 08:10:15 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Pacemaker::Corosync/File_line[pcsd_bind_addr]/ensure: created Jan 23 08:10:15 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/password: changed [redacted] to [redacted] Jan 23 08:10:15 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3575) Jan 23 08:10:15 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/groups: groups changed to ['haclient'] Jan 23 08:10:16 np0005593103 systemd[1]: Reloading. Jan 23 08:10:16 np0005593103 systemd-sysv-generator[51238]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:16 np0005593103 systemd-rc-local-generator[51234]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:16 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:16 np0005593103 systemd[1]: Starting PCS GUI and remote configuration interface (Ruby)... Jan 23 08:10:16 np0005593103 pcsd[51245]: 2026-01-23 08:10:16 +0000 INFO Notifying systemd we are running (socket /run/systemd/notify) Jan 23 08:10:16 np0005593103 systemd[1]: Started PCS GUI and remote configuration interface (Ruby). Jan 23 08:10:16 np0005593103 systemd[1]: Starting PCS GUI and remote configuration interface... Jan 23 08:10:16 np0005593103 python3[51262]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:18 np0005593103 systemd[1]: Started PCS GUI and remote configuration interface. Jan 23 08:10:18 np0005593103 systemd[1]: Reloading. Jan 23 08:10:18 np0005593103 systemd-rc-local-generator[51383]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:18 np0005593103 systemd-sysv-generator[51388]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:19 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:19 np0005593103 systemd[1]: Reloading. Jan 23 08:10:19 np0005593103 systemd-rc-local-generator[51424]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 08:10:19 np0005593103 systemd-sysv-generator[51427]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 08:10:19 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 08:10:19 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Pacemaker::Service/Service[pcsd]/ensure: ensure changed 'stopped' to 'running' Jan 23 08:10:19 np0005593103 puppet-user[48820]: Notice: /Stage[main]/Pacemaker::Corosync/Exec[check-for-local-authentication]/returns: executed successfully Jan 23 08:10:20 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3570) Jan 23 08:10:25 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3565) Jan 23 08:10:27 np0005593103 python3[51470]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:30 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3560) Jan 23 08:10:35 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3555) Jan 23 08:10:37 np0005593103 python3[51503]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:40 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3550) Jan 23 08:10:45 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3545) Jan 23 08:10:47 np0005593103 python3[51536]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:10:50 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3540) Jan 23 08:10:55 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3535) Jan 23 08:10:58 np0005593103 python3[51569]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:00 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3530) Jan 23 08:11:05 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3525) Jan 23 08:11:08 np0005593103 python3[51602]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:10 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3520) Jan 23 08:11:15 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3515) Jan 23 08:11:18 np0005593103 python3[51635]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:20 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3510) Jan 23 08:11:25 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3505) Jan 23 08:11:29 np0005593103 python3[51668]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:30 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3500) Jan 23 08:11:35 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3495) Jan 23 08:11:39 np0005593103 python3[51701]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:40 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3490) Jan 23 08:11:45 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3485) Jan 23 08:11:49 np0005593103 python3[51722]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:11:50 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3480) Jan 23 08:11:55 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3475) Jan 23 08:12:00 np0005593103 python3[51753]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:00 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3470) Jan 23 08:12:05 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3465) Jan 23 08:12:10 np0005593103 python3[51786]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:10 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3460) Jan 23 08:12:15 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3455) Jan 23 08:12:20 np0005593103 python3[51816]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:20 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3450) Jan 23 08:12:25 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3445) Jan 23 08:12:30 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3440) Jan 23 08:12:31 np0005593103 python3[51849]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:35 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3435) Jan 23 08:12:40 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3430) Jan 23 08:12:41 np0005593103 python3[51882]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:45 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3425) Jan 23 08:12:50 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3420) Jan 23 08:12:51 np0005593103 python3[51915]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:12:55 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3415) Jan 23 08:13:00 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3410) Jan 23 08:13:01 np0005593103 python3[51948]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:05 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3405) Jan 23 08:13:10 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3400) Jan 23 08:13:12 np0005593103 python3[51981]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:15 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3395) Jan 23 08:13:20 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3390) Jan 23 08:13:22 np0005593103 python3[52014]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:25 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3385) Jan 23 08:13:30 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3380) Jan 23 08:13:32 np0005593103 python3[52047]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:35 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3375) Jan 23 08:13:40 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3370) Jan 23 08:13:43 np0005593103 python3[52080]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:45 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3365) Jan 23 08:13:50 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3360) Jan 23 08:13:53 np0005593103 python3[52113]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:13:55 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3355) Jan 23 08:14:00 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3350) Jan 23 08:14:03 np0005593103 python3[52135]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:05 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3345) Jan 23 08:14:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3340) Jan 23 08:14:14 np0005593103 python3[52166]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3335) Jan 23 08:14:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3330) Jan 23 08:14:24 np0005593103 python3[52199]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3325) Jan 23 08:14:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3320) Jan 23 08:14:34 np0005593103 python3[52229]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3315) Jan 23 08:14:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3310) Jan 23 08:14:44 np0005593103 python3[52262]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3305) Jan 23 08:14:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3300) Jan 23 08:14:55 np0005593103 python3[52295]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:14:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3295) Jan 23 08:15:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3290) Jan 23 08:15:05 np0005593103 python3[52328]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3285) Jan 23 08:15:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3280) Jan 23 08:15:15 np0005593103 python3[52361]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3275) Jan 23 08:15:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3270) Jan 23 08:15:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3265) Jan 23 08:15:26 np0005593103 python3[52394]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3260) Jan 23 08:15:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3255) Jan 23 08:15:36 np0005593103 python3[52427]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3250) Jan 23 08:15:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3245) Jan 23 08:15:46 np0005593103 python3[52460]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:15:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3240) Jan 23 08:15:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3235) Jan 23 08:15:57 np0005593103 python3[52493]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3230) Jan 23 08:16:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3225) Jan 23 08:16:07 np0005593103 python3[52516]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3220) Jan 23 08:16:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3215) Jan 23 08:16:17 np0005593103 python3[52545]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3210) Jan 23 08:16:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3205) Jan 23 08:16:27 np0005593103 python3[52578]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3200) Jan 23 08:16:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3195) Jan 23 08:16:38 np0005593103 python3[52611]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3190) Jan 23 08:16:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3185) Jan 23 08:16:48 np0005593103 python3[52641]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:16:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3180) Jan 23 08:16:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3175) Jan 23 08:16:58 np0005593103 python3[52674]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3170) Jan 23 08:17:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3165) Jan 23 08:17:09 np0005593103 python3[52707]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3160) Jan 23 08:17:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3155) Jan 23 08:17:19 np0005593103 python3[52740]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3150) Jan 23 08:17:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3145) Jan 23 08:17:29 np0005593103 python3[52773]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3140) Jan 23 08:17:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3135) Jan 23 08:17:40 np0005593103 python3[52806]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3130) Jan 23 08:17:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3125) Jan 23 08:17:50 np0005593103 python3[52841]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:17:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3120) Jan 23 08:17:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3115) Jan 23 08:18:00 np0005593103 python3[52874]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3110) Jan 23 08:18:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3105) Jan 23 08:18:11 np0005593103 python3[52907]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3100) Jan 23 08:18:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3095) Jan 23 08:18:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3090) Jan 23 08:18:21 np0005593103 python3[52930]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3085) Jan 23 08:18:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3080) Jan 23 08:18:31 np0005593103 python3[52959]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3075) Jan 23 08:18:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3070) Jan 23 08:18:42 np0005593103 python3[52992]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3065) Jan 23 08:18:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3060) Jan 23 08:18:52 np0005593103 python3[53025]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:18:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3055) Jan 23 08:19:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3050) Jan 23 08:19:02 np0005593103 python3[53058]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3045) Jan 23 08:19:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3040) Jan 23 08:19:12 np0005593103 python3[53088]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3035) Jan 23 08:19:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3030) Jan 23 08:19:23 np0005593103 python3[53121]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3025) Jan 23 08:19:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3020) Jan 23 08:19:33 np0005593103 python3[53154]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3015) Jan 23 08:19:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3010) Jan 23 08:19:43 np0005593103 python3[53187]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3005) Jan 23 08:19:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (3000) Jan 23 08:19:54 np0005593103 python3[53220]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:19:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2995) Jan 23 08:20:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2990) Jan 23 08:20:04 np0005593103 python3[53253]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2985) Jan 23 08:20:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2980) Jan 23 08:20:14 np0005593103 python3[53286]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2975) Jan 23 08:20:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2970) Jan 23 08:20:25 np0005593103 python3[53319]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2965) Jan 23 08:20:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2960) Jan 23 08:20:35 np0005593103 python3[53352]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2955) Jan 23 08:20:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2950) Jan 23 08:20:45 np0005593103 python3[53373]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2945) Jan 23 08:20:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2940) Jan 23 08:20:55 np0005593103 python3[53404]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:20:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2935) Jan 23 08:21:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2930) Jan 23 08:21:06 np0005593103 python3[53438]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2925) Jan 23 08:21:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2920) Jan 23 08:21:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2915) Jan 23 08:21:16 np0005593103 python3[53471]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2910) Jan 23 08:21:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2905) Jan 23 08:21:26 np0005593103 python3[53501]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2900) Jan 23 08:21:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2895) Jan 23 08:21:36 np0005593103 python3[53534]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2890) Jan 23 08:21:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2885) Jan 23 08:21:47 np0005593103 python3[53567]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:21:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2880) Jan 23 08:21:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2875) Jan 23 08:21:57 np0005593103 python3[53600]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2870) Jan 23 08:22:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2865) Jan 23 08:22:07 np0005593103 python3[53633]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2860) Jan 23 08:22:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2855) Jan 23 08:22:18 np0005593103 python3[53666]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2850) Jan 23 08:22:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2845) Jan 23 08:22:28 np0005593103 python3[53699]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2840) Jan 23 08:22:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2835) Jan 23 08:22:38 np0005593103 python3[53732]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2830) Jan 23 08:22:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2825) Jan 23 08:22:49 np0005593103 python3[53765]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:22:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2820) Jan 23 08:22:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2815) Jan 23 08:22:59 np0005593103 python3[53787]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2810) Jan 23 08:23:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2805) Jan 23 08:23:09 np0005593103 python3[53817]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2800) Jan 23 08:23:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2795) Jan 23 08:23:20 np0005593103 python3[53850]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2790) Jan 23 08:23:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2785) Jan 23 08:23:30 np0005593103 python3[53883]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2780) Jan 23 08:23:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2775) Jan 23 08:23:40 np0005593103 python3[53915]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2770) Jan 23 08:23:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2765) Jan 23 08:23:50 np0005593103 python3[53946]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:23:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2760) Jan 23 08:23:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2755) Jan 23 08:24:01 np0005593103 python3[53979]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2750) Jan 23 08:24:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2745) Jan 23 08:24:11 np0005593103 python3[54012]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2740) Jan 23 08:24:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2735) Jan 23 08:24:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2730) Jan 23 08:24:21 np0005593103 python3[54045]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2725) Jan 23 08:24:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2720) Jan 23 08:24:32 np0005593103 python3[54078]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2715) Jan 23 08:24:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2710) Jan 23 08:24:42 np0005593103 python3[54111]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2705) Jan 23 08:24:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2700) Jan 23 08:24:52 np0005593103 python3[54144]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:24:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2695) Jan 23 08:25:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2690) Jan 23 08:25:03 np0005593103 python3[54177]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2685) Jan 23 08:25:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2680) Jan 23 08:25:13 np0005593103 python3[54210]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2675) Jan 23 08:25:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2670) Jan 23 08:25:23 np0005593103 python3[54231]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2665) Jan 23 08:25:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2660) Jan 23 08:25:33 np0005593103 python3[54262]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2655) Jan 23 08:25:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2650) Jan 23 08:25:44 np0005593103 python3[54295]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2645) Jan 23 08:25:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2640) Jan 23 08:25:54 np0005593103 python3[54328]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:25:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2635) Jan 23 08:26:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2630) Jan 23 08:26:01 np0005593103 systemd[1]: session-14.scope: Deactivated successfully. Jan 23 08:26:01 np0005593103 systemd[1]: session-14.scope: Consumed 3.011s CPU time. Jan 23 08:26:01 np0005593103 systemd-logind[36446]: Session 14 logged out. Waiting for processes to exit. Jan 23 08:26:01 np0005593103 systemd-logind[36446]: Removed session 14. Jan 23 08:26:04 np0005593103 python3[54359]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2625) Jan 23 08:26:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2620) Jan 23 08:26:12 np0005593103 systemd[1]: Stopping User Manager for UID 1000... Jan 23 08:26:12 np0005593103 systemd[4174]: Activating special unit Exit the Session... Jan 23 08:26:12 np0005593103 systemd[4174]: Stopping podman-pause-c5f12e3a.scope... Jan 23 08:26:12 np0005593103 systemd[4174]: Removed slice User Background Tasks Slice. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped target Main User Target. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped target Basic System. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped target Paths. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped target Sockets. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped target Timers. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped Mark boot as successful after the user session has run 2 minutes. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped Daily Cleanup of User's Temporary Directories. Jan 23 08:26:12 np0005593103 dbus-broker[18436]: Dispatched 3228 messages @ 1(±18)μs / message. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopping D-Bus User Message Bus... Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped Create User's Volatile Files and Directories. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped podman-pause-c5f12e3a.scope. Jan 23 08:26:12 np0005593103 systemd[4174]: Removed slice Slice /user. Jan 23 08:26:12 np0005593103 systemd[4174]: Stopped D-Bus User Message Bus. Jan 23 08:26:12 np0005593103 systemd[4174]: Closed D-Bus User Message Bus Socket. Jan 23 08:26:12 np0005593103 systemd[4174]: Removed slice User Application Slice. Jan 23 08:26:12 np0005593103 systemd[4174]: Reached target Shutdown. Jan 23 08:26:12 np0005593103 systemd[4174]: Finished Exit the Session. Jan 23 08:26:12 np0005593103 systemd[4174]: Reached target Exit the Session. Jan 23 08:26:12 np0005593103 systemd[1]: user@1000.service: Deactivated successfully. Jan 23 08:26:12 np0005593103 systemd[1]: Stopped User Manager for UID 1000. Jan 23 08:26:12 np0005593103 systemd[1]: user@1000.service: Consumed 1.608s CPU time, read 20.0K from disk, written 4.0K to disk. Jan 23 08:26:15 np0005593103 python3[54394]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2615) Jan 23 08:26:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2610) Jan 23 08:26:22 np0005593103 sshd[54412]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:26:22 np0005593103 sshd[54413]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:26:25 np0005593103 python3[54429]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2605) Jan 23 08:26:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2600) Jan 23 08:26:35 np0005593103 python3[54463]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2595) Jan 23 08:26:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2590) Jan 23 08:26:46 np0005593103 python3[54496]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2585) Jan 23 08:26:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2580) Jan 23 08:26:56 np0005593103 python3[54529]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:26:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2575) Jan 23 08:27:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2570) Jan 23 08:27:06 np0005593103 python3[54562]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2565) Jan 23 08:27:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2560) Jan 23 08:27:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2555) Jan 23 08:27:16 np0005593103 python3[54595]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2550) Jan 23 08:27:24 np0005593103 sshd[54599]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:27:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2545) Jan 23 08:27:27 np0005593103 python3[54629]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2540) Jan 23 08:27:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2535) Jan 23 08:27:37 np0005593103 python3[54651]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2530) Jan 23 08:27:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2525) Jan 23 08:27:47 np0005593103 python3[54681]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:27:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2520) Jan 23 08:27:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2515) Jan 23 08:27:58 np0005593103 python3[54714]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2510) Jan 23 08:28:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2505) Jan 23 08:28:08 np0005593103 python3[54749]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2500) Jan 23 08:28:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2495) Jan 23 08:28:18 np0005593103 python3[54779]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2490) Jan 23 08:28:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2485) Jan 23 08:28:29 np0005593103 python3[54812]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:31 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2480) Jan 23 08:28:36 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2475) Jan 23 08:28:39 np0005593103 python3[54845]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:41 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2470) Jan 23 08:28:46 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2465) Jan 23 08:28:49 np0005593103 python3[54878]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:28:51 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2460) Jan 23 08:28:56 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2455) Jan 23 08:28:59 np0005593103 python3[54911]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:01 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2450) Jan 23 08:29:06 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2445) Jan 23 08:29:10 np0005593103 python3[54944]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:11 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2440) Jan 23 08:29:16 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2435) Jan 23 08:29:20 np0005593103 python3[54977]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:21 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2430) Jan 23 08:29:26 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2425) Jan 23 08:29:30 np0005593103 python3[55010]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2420) Jan 23 08:29:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2415) Jan 23 08:29:41 np0005593103 python3[55043]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2410) Jan 23 08:29:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2405) Jan 23 08:29:51 np0005593103 python3[55066]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:29:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2400) Jan 23 08:29:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2395) Jan 23 08:30:01 np0005593103 python3[55095]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2390) Jan 23 08:30:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2385) Jan 23 08:30:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2380) Jan 23 08:30:12 np0005593103 python3[55128]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2375) Jan 23 08:30:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2370) Jan 23 08:30:22 np0005593103 python3[55161]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2365) Jan 23 08:30:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2360) Jan 23 08:30:32 np0005593103 python3[55194]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2355) Jan 23 08:30:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2350) Jan 23 08:30:42 np0005593103 python3[55224]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2345) Jan 23 08:30:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2340) Jan 23 08:30:53 np0005593103 python3[55257]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:30:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2335) Jan 23 08:31:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2330) Jan 23 08:31:03 np0005593103 python3[55290]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2325) Jan 23 08:31:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2320) Jan 23 08:31:14 np0005593103 python3[55323]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2315) Jan 23 08:31:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2310) Jan 23 08:31:24 np0005593103 python3[55356]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2305) Jan 23 08:31:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2300) Jan 23 08:31:34 np0005593103 python3[55389]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2295) Jan 23 08:31:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2290) Jan 23 08:31:44 np0005593103 python3[55422]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2285) Jan 23 08:31:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2280) Jan 23 08:31:55 np0005593103 python3[55455]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:31:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2275) Jan 23 08:32:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2270) Jan 23 08:32:05 np0005593103 python3[55489]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2265) Jan 23 08:32:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2260) Jan 23 08:32:15 np0005593103 python3[55511]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2255) Jan 23 08:32:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2250) Jan 23 08:32:26 np0005593103 python3[55541]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2245) Jan 23 08:32:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2240) Jan 23 08:32:36 np0005593103 python3[55574]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2235) Jan 23 08:32:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2230) Jan 23 08:32:46 np0005593103 python3[55608]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2225) Jan 23 08:32:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2220) Jan 23 08:32:57 np0005593103 python3[55639]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:32:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2215) Jan 23 08:33:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2210) Jan 23 08:33:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2205) Jan 23 08:33:07 np0005593103 python3[55672]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2200) Jan 23 08:33:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2195) Jan 23 08:33:17 np0005593103 python3[55705]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2190) Jan 23 08:33:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2185) Jan 23 08:33:27 np0005593103 python3[55738]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2180) Jan 23 08:33:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2175) Jan 23 08:33:38 np0005593103 python3[55771]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2170) Jan 23 08:33:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2165) Jan 23 08:33:48 np0005593103 python3[55804]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:33:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2160) Jan 23 08:33:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2155) Jan 23 08:33:58 np0005593103 python3[55837]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2150) Jan 23 08:34:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2145) Jan 23 08:34:09 np0005593103 python3[55870]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2140) Jan 23 08:34:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2135) Jan 23 08:34:19 np0005593103 python3[55903]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:20 np0005593103 sshd[55904]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:34:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2130) Jan 23 08:34:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2125) Jan 23 08:34:29 np0005593103 python3[55935]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2120) Jan 23 08:34:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2115) Jan 23 08:34:39 np0005593103 python3[55958]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2110) Jan 23 08:34:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2105) Jan 23 08:34:50 np0005593103 python3[55990]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:34:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2100) Jan 23 08:34:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2095) Jan 23 08:35:00 np0005593103 python3[56023]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2090) Jan 23 08:35:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2085) Jan 23 08:35:10 np0005593103 python3[56053]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2080) Jan 23 08:35:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2075) Jan 23 08:35:21 np0005593103 python3[56086]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2070) Jan 23 08:35:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2065) Jan 23 08:35:31 np0005593103 python3[56119]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2060) Jan 23 08:35:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2055) Jan 23 08:35:41 np0005593103 python3[56152]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2050) Jan 23 08:35:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2045) Jan 23 08:35:52 np0005593103 python3[56185]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:35:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2040) Jan 23 08:35:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2035) Jan 23 08:36:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2030) Jan 23 08:36:02 np0005593103 python3[56218]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2025) Jan 23 08:36:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2020) Jan 23 08:36:12 np0005593103 python3[56251]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2015) Jan 23 08:36:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2010) Jan 23 08:36:23 np0005593103 python3[56284]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2005) Jan 23 08:36:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (2000) Jan 23 08:36:33 np0005593103 python3[56317]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1995) Jan 23 08:36:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1990) Jan 23 08:36:43 np0005593103 python3[56350]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1985) Jan 23 08:36:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1980) Jan 23 08:36:53 np0005593103 python3[56372]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:36:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1975) Jan 23 08:37:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1970) Jan 23 08:37:04 np0005593103 python3[56402]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1965) Jan 23 08:37:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1960) Jan 23 08:37:14 np0005593103 python3[56435]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1955) Jan 23 08:37:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1950) Jan 23 08:37:24 np0005593103 python3[56466]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1945) Jan 23 08:37:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1940) Jan 23 08:37:35 np0005593103 python3[56499]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1935) Jan 23 08:37:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1930) Jan 23 08:37:45 np0005593103 python3[56532]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1925) Jan 23 08:37:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1920) Jan 23 08:37:55 np0005593103 python3[56565]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:37:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1915) Jan 23 08:38:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1910) Jan 23 08:38:06 np0005593103 python3[56598]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1905) Jan 23 08:38:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1900) Jan 23 08:38:16 np0005593103 python3[56631]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1895) Jan 23 08:38:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1890) Jan 23 08:38:26 np0005593103 python3[56664]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1885) Jan 23 08:38:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1880) Jan 23 08:38:37 np0005593103 python3[56697]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1875) Jan 23 08:38:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1870) Jan 23 08:38:47 np0005593103 python3[56730]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:38:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1865) Jan 23 08:38:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1860) Jan 23 08:38:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1855) Jan 23 08:38:57 np0005593103 python3[56763]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1850) Jan 23 08:39:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1845) Jan 23 08:39:07 np0005593103 python3[56794]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1840) Jan 23 08:39:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1835) Jan 23 08:39:18 np0005593103 python3[56817]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1830) Jan 23 08:39:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1825) Jan 23 08:39:28 np0005593103 python3[56848]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1820) Jan 23 08:39:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1815) Jan 23 08:39:38 np0005593103 python3[56878]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1810) Jan 23 08:39:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1805) Jan 23 08:39:49 np0005593103 python3[56911]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:39:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1800) Jan 23 08:39:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1795) Jan 23 08:39:59 np0005593103 python3[56944]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1790) Jan 23 08:40:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1785) Jan 23 08:40:09 np0005593103 python3[56977]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1780) Jan 23 08:40:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1775) Jan 23 08:40:20 np0005593103 python3[57010]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1770) Jan 23 08:40:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1765) Jan 23 08:40:30 np0005593103 python3[57043]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1760) Jan 23 08:40:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1755) Jan 23 08:40:40 np0005593103 python3[57076]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1750) Jan 23 08:40:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1745) Jan 23 08:40:50 np0005593103 python3[57109]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:40:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1740) Jan 23 08:40:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1735) Jan 23 08:41:01 np0005593103 python3[57142]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1730) Jan 23 08:41:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1725) Jan 23 08:41:11 np0005593103 python3[57175]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1720) Jan 23 08:41:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1715) Jan 23 08:41:21 np0005593103 python3[57208]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1710) Jan 23 08:41:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1705) Jan 23 08:41:32 np0005593103 python3[57229]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1700) Jan 23 08:41:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1695) Jan 23 08:41:42 np0005593103 python3[57260]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1690) Jan 23 08:41:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1685) Jan 23 08:41:52 np0005593103 python3[57293]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:41:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1680) Jan 23 08:41:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1675) Jan 23 08:42:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1670) Jan 23 08:42:03 np0005593103 python3[57323]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1665) Jan 23 08:42:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1660) Jan 23 08:42:13 np0005593103 python3[57356]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1655) Jan 23 08:42:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1650) Jan 23 08:42:23 np0005593103 python3[57390]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1645) Jan 23 08:42:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1640) Jan 23 08:42:33 np0005593103 python3[57423]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1635) Jan 23 08:42:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1630) Jan 23 08:42:44 np0005593103 python3[57456]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1625) Jan 23 08:42:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1620) Jan 23 08:42:54 np0005593103 python3[57490]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:42:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1615) Jan 23 08:43:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1610) Jan 23 08:43:05 np0005593103 python3[57523]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1605) Jan 23 08:43:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1600) Jan 23 08:43:15 np0005593103 python3[57556]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1595) Jan 23 08:43:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1590) Jan 23 08:43:25 np0005593103 python3[57589]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1585) Jan 23 08:43:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1580) Jan 23 08:43:36 np0005593103 python3[57622]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1575) Jan 23 08:43:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1570) Jan 23 08:43:46 np0005593103 python3[57654]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1565) Jan 23 08:43:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1560) Jan 23 08:43:56 np0005593103 python3[57676]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:43:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1555) Jan 23 08:44:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1550) Jan 23 08:44:07 np0005593103 python3[57707]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1545) Jan 23 08:44:12 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1540) Jan 23 08:44:17 np0005593103 python3[57737]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:17 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1535) Jan 23 08:44:22 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1530) Jan 23 08:44:27 np0005593103 python3[57770]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:27 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1525) Jan 23 08:44:32 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1520) Jan 23 08:44:37 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1515) Jan 23 08:44:38 np0005593103 python3[57803]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:42 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1510) Jan 23 08:44:47 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1505) Jan 23 08:44:48 np0005593103 python3[57836]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:44:52 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1500) Jan 23 08:44:57 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1495) Jan 23 08:44:58 np0005593103 python3[57869]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:02 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1490) Jan 23 08:45:07 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1485) Jan 23 08:45:09 np0005593103 python3[57902]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1480) Jan 23 08:45:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1475) Jan 23 08:45:19 np0005593103 python3[57935]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1470) Jan 23 08:45:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1465) Jan 23 08:45:29 np0005593103 python3[57968]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1460) Jan 23 08:45:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1455) Jan 23 08:45:39 np0005593103 python3[58001]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1450) Jan 23 08:45:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1445) Jan 23 08:45:50 np0005593103 python3[58034]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:45:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1440) Jan 23 08:45:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1435) Jan 23 08:46:00 np0005593103 python3[58067]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1430) Jan 23 08:46:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1425) Jan 23 08:46:10 np0005593103 python3[58090]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1420) Jan 23 08:46:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1415) Jan 23 08:46:21 np0005593103 python3[58119]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1410) Jan 23 08:46:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1405) Jan 23 08:46:31 np0005593103 python3[58152]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1400) Jan 23 08:46:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1395) Jan 23 08:46:41 np0005593103 python3[58182]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1390) Jan 23 08:46:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1385) Jan 23 08:46:52 np0005593103 python3[58215]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:46:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1380) Jan 23 08:46:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1375) Jan 23 08:47:02 np0005593103 python3[58248]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1370) Jan 23 08:47:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1365) Jan 23 08:47:12 np0005593103 python3[58281]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1360) Jan 23 08:47:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1355) Jan 23 08:47:23 np0005593103 python3[58314]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1350) Jan 23 08:47:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1345) Jan 23 08:47:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1340) Jan 23 08:47:33 np0005593103 python3[58347]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1335) Jan 23 08:47:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1330) Jan 23 08:47:43 np0005593103 python3[58380]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1325) Jan 23 08:47:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1320) Jan 23 08:47:54 np0005593103 python3[58414]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:47:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1315) Jan 23 08:48:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1310) Jan 23 08:48:04 np0005593103 python3[58447]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1305) Jan 23 08:48:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1300) Jan 23 08:48:15 np0005593103 python3[58480]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1295) Jan 23 08:48:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1290) Jan 23 08:48:25 np0005593103 python3[58513]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1285) Jan 23 08:48:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1280) Jan 23 08:48:35 np0005593103 python3[58535]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1275) Jan 23 08:48:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1270) Jan 23 08:48:46 np0005593103 python3[58566]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1265) Jan 23 08:48:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1260) Jan 23 08:48:56 np0005593103 python3[58599]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:48:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1255) Jan 23 08:49:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1250) Jan 23 08:49:06 np0005593103 python3[58629]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1245) Jan 23 08:49:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1240) Jan 23 08:49:17 np0005593103 python3[58662]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1235) Jan 23 08:49:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1230) Jan 23 08:49:27 np0005593103 python3[58695]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1225) Jan 23 08:49:28 np0005593103 sshd[58696]: main: sshd: ssh-rsa algorithm is disabled Jan 23 08:49:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1220) Jan 23 08:49:37 np0005593103 python3[58729]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1215) Jan 23 08:49:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1210) Jan 23 08:49:47 np0005593103 python3[58762]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1205) Jan 23 08:49:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1200) Jan 23 08:49:58 np0005593103 python3[58795]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:49:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1195) Jan 23 08:50:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1190) Jan 23 08:50:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1185) Jan 23 08:50:08 np0005593103 python3[58828]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1180) Jan 23 08:50:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1175) Jan 23 08:50:18 np0005593103 python3[58861]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1170) Jan 23 08:50:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1165) Jan 23 08:50:29 np0005593103 python3[58894]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1160) Jan 23 08:50:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1155) Jan 23 08:50:39 np0005593103 python3[58917]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1150) Jan 23 08:50:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1145) Jan 23 08:50:49 np0005593103 python3[58946]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:50:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1140) Jan 23 08:50:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1135) Jan 23 08:51:00 np0005593103 python3[58979]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1130) Jan 23 08:51:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1125) Jan 23 08:51:10 np0005593103 python3[59013]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1120) Jan 23 08:51:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1115) Jan 23 08:51:20 np0005593103 python3[59043]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1110) Jan 23 08:51:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1105) Jan 23 08:51:30 np0005593103 python3[59076]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1100) Jan 23 08:51:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1095) Jan 23 08:51:41 np0005593103 python3[59109]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1090) Jan 23 08:51:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1085) Jan 23 08:51:51 np0005593103 python3[59142]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:51:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1080) Jan 23 08:51:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1075) Jan 23 08:52:01 np0005593103 python3[59175]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1070) Jan 23 08:52:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1065) Jan 23 08:52:12 np0005593103 python3[59208]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1060) Jan 23 08:52:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1055) Jan 23 08:52:22 np0005593103 python3[59241]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1050) Jan 23 08:52:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1045) Jan 23 08:52:32 np0005593103 python3[59274]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1040) Jan 23 08:52:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1035) Jan 23 08:52:43 np0005593103 python3[59307]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1030) Jan 23 08:52:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1025) Jan 23 08:52:53 np0005593103 python3[59340]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:52:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1020) Jan 23 08:52:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1015) Jan 23 08:53:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1010) Jan 23 08:53:03 np0005593103 python3[59361]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1005) Jan 23 08:53:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (1000) Jan 23 08:53:14 np0005593103 python3[59392]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (995) Jan 23 08:53:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (990) Jan 23 08:53:24 np0005593103 python3[59425]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (985) Jan 23 08:53:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (980) Jan 23 08:53:34 np0005593103 python3[59455]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (975) Jan 23 08:53:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (970) Jan 23 08:53:45 np0005593103 python3[59488]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (965) Jan 23 08:53:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (960) Jan 23 08:53:55 np0005593103 python3[59522]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:53:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (955) Jan 23 08:54:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (950) Jan 23 08:54:05 np0005593103 python3[59555]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (945) Jan 23 08:54:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (940) Jan 23 08:54:15 np0005593103 python3[59588]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (935) Jan 23 08:54:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (930) Jan 23 08:54:26 np0005593103 python3[59621]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (925) Jan 23 08:54:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (920) Jan 23 08:54:36 np0005593103 python3[59654]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (915) Jan 23 08:54:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (910) Jan 23 08:54:46 np0005593103 python3[59687]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (905) Jan 23 08:54:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (900) Jan 23 08:54:57 np0005593103 python3[59720]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:54:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (895) Jan 23 08:55:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (890) Jan 23 08:55:07 np0005593103 python3[59753]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (885) Jan 23 08:55:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (880) Jan 23 08:55:17 np0005593103 python3[59776]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (875) Jan 23 08:55:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (870) Jan 23 08:55:28 np0005593103 python3[59805]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (865) Jan 23 08:55:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (860) Jan 23 08:55:38 np0005593103 python3[59838]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (855) Jan 23 08:55:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (850) Jan 23 08:55:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (845) Jan 23 08:55:48 np0005593103 python3[59871]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:55:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (840) Jan 23 08:55:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (835) Jan 23 08:55:59 np0005593103 python3[59901]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (830) Jan 23 08:56:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (825) Jan 23 08:56:09 np0005593103 python3[59934]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (820) Jan 23 08:56:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (815) Jan 23 08:56:19 np0005593103 python3[59967]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (810) Jan 23 08:56:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (805) Jan 23 08:56:29 np0005593103 python3[60000]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (800) Jan 23 08:56:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (795) Jan 23 08:56:40 np0005593103 python3[60033]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (790) Jan 23 08:56:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (785) Jan 23 08:56:50 np0005593103 python3[60066]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:56:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (780) Jan 23 08:56:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (775) Jan 23 08:57:00 np0005593103 python3[60099]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (770) Jan 23 08:57:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (765) Jan 23 08:57:11 np0005593103 python3[60132]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (760) Jan 23 08:57:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (755) Jan 23 08:57:21 np0005593103 python3[60165]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (750) Jan 23 08:57:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (745) Jan 23 08:57:31 np0005593103 python3[60188]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (740) Jan 23 08:57:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (735) Jan 23 08:57:42 np0005593103 python3[60217]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (730) Jan 23 08:57:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (725) Jan 23 08:57:52 np0005593103 python3[60250]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:57:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (720) Jan 23 08:57:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (715) Jan 23 08:58:02 np0005593103 python3[60283]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (710) Jan 23 08:58:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (705) Jan 23 08:58:13 np0005593103 python3[60313]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (700) Jan 23 08:58:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (695) Jan 23 08:58:23 np0005593103 python3[60346]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (690) Jan 23 08:58:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (685) Jan 23 08:58:33 np0005593103 python3[60379]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (680) Jan 23 08:58:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (675) Jan 23 08:58:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (670) Jan 23 08:58:44 np0005593103 python3[60412]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (665) Jan 23 08:58:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (660) Jan 23 08:58:54 np0005593103 python3[60445]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:58:58 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (655) Jan 23 08:59:03 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (650) Jan 23 08:59:04 np0005593103 python3[60478]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:08 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (645) Jan 23 08:59:13 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (640) Jan 23 08:59:14 np0005593103 python3[60512]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:18 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (635) Jan 23 08:59:23 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (630) Jan 23 08:59:25 np0005593103 python3[60545]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:28 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (625) Jan 23 08:59:33 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (620) Jan 23 08:59:35 np0005593103 python3[60578]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:38 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (615) Jan 23 08:59:43 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (610) Jan 23 08:59:45 np0005593103 python3[60609]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:48 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (605) Jan 23 08:59:53 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (600) Jan 23 08:59:56 np0005593103 python3[60632]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 08:59:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (595) Jan 23 09:00:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (590) Jan 23 09:00:06 np0005593103 python3[60663]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (585) Jan 23 09:00:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (580) Jan 23 09:00:16 np0005593103 python3[60696]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (575) Jan 23 09:00:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (570) Jan 23 09:00:27 np0005593103 python3[60729]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (565) Jan 23 09:00:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (560) Jan 23 09:00:37 np0005593103 python3[60759]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (555) Jan 23 09:00:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (550) Jan 23 09:00:47 np0005593103 python3[60792]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (545) Jan 23 09:00:54 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (540) Jan 23 09:00:57 np0005593103 systemd[1]: Starting dnf makecache... Jan 23 09:00:58 np0005593103 python3[60825]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:00:58 np0005593103 dnf[60826]: Updating Subscription Management repositories. Jan 23 09:00:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (535) Jan 23 09:00:59 np0005593103 dnf[60826]: Metadata cache refreshed recently. Jan 23 09:01:00 np0005593103 systemd[1]: dnf-makecache.service: Deactivated successfully. Jan 23 09:01:00 np0005593103 systemd[1]: Finished dnf makecache. Jan 23 09:01:00 np0005593103 systemd[1]: dnf-makecache.service: Consumed 2.222s CPU time. Jan 23 09:01:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (530) Jan 23 09:01:08 np0005593103 python3[60871]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (525) Jan 23 09:01:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (520) Jan 23 09:01:18 np0005593103 python3[60904]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (515) Jan 23 09:01:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (510) Jan 23 09:01:28 np0005593103 python3[60937]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (505) Jan 23 09:01:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (500) Jan 23 09:01:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (495) Jan 23 09:01:39 np0005593103 python3[60971]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (490) Jan 23 09:01:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (485) Jan 23 09:01:49 np0005593103 python3[61004]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:01:54 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (480) Jan 23 09:01:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (475) Jan 23 09:01:59 np0005593103 python3[61027]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (470) Jan 23 09:02:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (465) Jan 23 09:02:10 np0005593103 python3[61057]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (460) Jan 23 09:02:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (455) Jan 23 09:02:20 np0005593103 python3[61089]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (450) Jan 23 09:02:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (445) Jan 23 09:02:30 np0005593103 python3[61122]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (440) Jan 23 09:02:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (435) Jan 23 09:02:41 np0005593103 python3[61156]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (430) Jan 23 09:02:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (425) Jan 23 09:02:51 np0005593103 python3[61187]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:02:54 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (420) Jan 23 09:02:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (415) Jan 23 09:03:01 np0005593103 python3[61220]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (410) Jan 23 09:03:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (405) Jan 23 09:03:12 np0005593103 python3[61253]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (400) Jan 23 09:03:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (395) Jan 23 09:03:22 np0005593103 python3[61286]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (390) Jan 23 09:03:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (385) Jan 23 09:03:32 np0005593103 python3[61319]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (380) Jan 23 09:03:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (375) Jan 23 09:03:42 np0005593103 python3[61352]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (370) Jan 23 09:03:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (365) Jan 23 09:03:53 np0005593103 python3[61385]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:03:54 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (360) Jan 23 09:03:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (355) Jan 23 09:04:03 np0005593103 python3[61418]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (350) Jan 23 09:04:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (345) Jan 23 09:04:13 np0005593103 python3[61441]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (340) Jan 23 09:04:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (335) Jan 23 09:04:24 np0005593103 python3[61472]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (330) Jan 23 09:04:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (325) Jan 23 09:04:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (320) Jan 23 09:04:34 np0005593103 python3[61503]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (315) Jan 23 09:04:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (310) Jan 23 09:04:44 np0005593103 python3[61536]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (305) Jan 23 09:04:54 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (300) Jan 23 09:04:55 np0005593103 python3[61569]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:04:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (295) Jan 23 09:05:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (290) Jan 23 09:05:05 np0005593103 python3[61599]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (285) Jan 23 09:05:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (280) Jan 23 09:05:15 np0005593103 python3[61632]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:16 np0005593103 sshd[61636]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:05:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (275) Jan 23 09:05:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (270) Jan 23 09:05:26 np0005593103 python3[61670]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (265) Jan 23 09:05:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (260) Jan 23 09:05:36 np0005593103 python3[61703]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (255) Jan 23 09:05:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (250) Jan 23 09:05:46 np0005593103 python3[61736]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (245) Jan 23 09:05:54 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (240) Jan 23 09:05:57 np0005593103 python3[61769]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:05:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (235) Jan 23 09:06:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (230) Jan 23 09:06:07 np0005593103 python3[61802]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (225) Jan 23 09:06:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (220) Jan 23 09:06:18 np0005593103 python3[61835]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (215) Jan 23 09:06:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (210) Jan 23 09:06:28 np0005593103 python3[61868]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (205) Jan 23 09:06:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (200) Jan 23 09:06:38 np0005593103 python3[61890]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (195) Jan 23 09:06:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (190) Jan 23 09:06:48 np0005593103 python3[61920]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (185) Jan 23 09:06:54 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (180) Jan 23 09:06:59 np0005593103 python3[61953]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:06:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (175) Jan 23 09:07:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (170) Jan 23 09:07:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (165) Jan 23 09:07:09 np0005593103 python3[61986]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (160) Jan 23 09:07:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (155) Jan 23 09:07:19 np0005593103 python3[62019]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (150) Jan 23 09:07:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (145) Jan 23 09:07:30 np0005593103 python3[62049]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (140) Jan 23 09:07:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (135) Jan 23 09:07:40 np0005593103 python3[62082]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (130) Jan 23 09:07:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (125) Jan 23 09:07:50 np0005593103 python3[62115]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:07:54 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (120) Jan 23 09:07:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (115) Jan 23 09:08:01 np0005593103 python3[62148]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (110) Jan 23 09:08:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (105) Jan 23 09:08:11 np0005593103 python3[62181]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (100) Jan 23 09:08:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (95) Jan 23 09:08:21 np0005593103 python3[62214]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (90) Jan 23 09:08:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (85) Jan 23 09:08:32 np0005593103 python3[62247]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (80) Jan 23 09:08:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (75) Jan 23 09:08:42 np0005593103 python3[62268]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (70) Jan 23 09:08:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (65) Jan 23 09:08:52 np0005593103 python3[62300]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:08:54 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (60) Jan 23 09:08:59 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (55) Jan 23 09:09:02 np0005593103 python3[62333]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:04 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (50) Jan 23 09:09:09 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (45) Jan 23 09:09:13 np0005593103 python3[62366]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:14 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (40) Jan 23 09:09:19 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (35) Jan 23 09:09:23 np0005593103 python3[62399]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:24 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (30) Jan 23 09:09:29 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (25) Jan 23 09:09:33 np0005593103 python3[62432]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:34 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (20) Jan 23 09:09:39 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (15) Jan 23 09:09:44 np0005593103 python3[62465]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:44 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (10) Jan 23 09:09:49 np0005593103 ansible-async_wrapper.py[48802]: 48803 still running (5) Jan 23 09:09:54 np0005593103 python3[62495]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:09:54 np0005593103 ansible-async_wrapper.py[48802]: Timeout reached, now killing 48803 Jan 23 09:09:54 np0005593103 ansible-async_wrapper.py[48802]: Sent kill to group 48803 Jan 23 09:10:04 np0005593103 python3[62514]: ansible-ansible.legacy.async_status Invoked with jid=196301315047.48799 mode=status _async_dir=/tmp/.ansible_async Jan 23 09:10:05 np0005593103 python3[62530]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 09:10:05 np0005593103 python3[62546]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:10:06 np0005593103 python3[62594]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:06 np0005593103 python3[62637]: ansible-ansible.legacy.copy Invoked with dest=/var/lib/container-puppet/puppetlabs/facter.conf setype=svirt_sandbox_file_t selevel=s0 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159405.8294744-172680-17374880639730/source _original_basename=tmp8j9_iw9g follow=False checksum=53908622cb869db5e2e2a68e737aa2ab1a872111 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 09:10:07 np0005593103 python3[62667]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:08 np0005593103 python3[62771]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Jan 23 09:10:08 np0005593103 python3[62790]: ansible-file Invoked with path=/var/lib/tripleo-config/container-puppet-config mode=448 recurse=True setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False state=None _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 09:10:09 np0005593103 python3[62806]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=False puppet_config=/var/lib/container-puppet/container-puppet.json short_hostname=np0005593103 step=1 update_config_hash_only=False Jan 23 09:10:09 np0005593103 python3[62822]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:10 np0005593103 python3[62838]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Jan 23 09:10:10 np0005593103 systemd-journald[618]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 75.4 (251 of 333 items), suggesting rotation. Jan 23 09:10:10 np0005593103 systemd-journald[618]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 09:10:10 np0005593103 rsyslogd[48608]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 09:10:10 np0005593103 rsyslogd[48608]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 09:10:11 np0005593103 python3[62855]: ansible-containers.podman.podman_container_info Invoked with executable=podman name=None Jan 23 09:10:11 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:11 np0005593103 python3[62882]: ansible-tripleo_container_manage Invoked with config_id=tripleo_puppet_step1 config_dir=/var/lib/tripleo-config/container-puppet-config/step_1 config_patterns=container-puppet-*.json config_overrides={} concurrency=6 log_base_path=/var/log/containers/stdouts debug=False Jan 23 09:10:11 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:12 np0005593103 podman[63031]: 2026-01-23 09:10:12.028606302 +0000 UTC m=+0.079190674 container create 307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, batch=17.1_20251118.1, release=1761123044, summary=Red Hat OpenStack Platform 17.1 glance-api, container_name=container-puppet-glance_api, version=17.1.12, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-glance-api-container, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, io.openshift.expose-services=, architecture=x86_64, url=https://www.redhat.com, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, build-date=2025-11-18T23:45:01Z) Jan 23 09:10:12 np0005593103 podman[63077]: 2026-01-23 09:10:12.054568894 +0000 UTC m=+0.057914605 container create 98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, tcib_managed=true, version=17.1.12, architecture=x86_64, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-mariadb, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, batch=17.1_20251118.1, managed_by=tripleo_ansible, container_name=container-puppet-clustercheck, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1) Jan 23 09:10:12 np0005593103 systemd[1]: Created slice Slice /machine. Jan 23 09:10:12 np0005593103 systemd[1]: Started libpod-conmon-307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c.scope. Jan 23 09:10:12 np0005593103 systemd[1]: Started libpod-conmon-98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699.scope. Jan 23 09:10:12 np0005593103 podman[63031]: 2026-01-23 09:10:11.988466661 +0000 UTC m=+0.039051053 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 09:10:12 np0005593103 podman[63092]: 2026-01-23 09:10:12.095957979 +0000 UTC m=+0.089393256 container create b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, url=https://www.redhat.com, container_name=container-puppet-ceilometer, version=17.1.12, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ceilometer-central-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2025-11-19T00:11:59Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, batch=17.1_20251118.1, name=rhosp17/openstack-ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, distribution-scope=public, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676) Jan 23 09:10:12 np0005593103 podman[63086]: 2026-01-23 09:10:12.103035098 +0000 UTC m=+0.096470375 container create 90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, summary=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, container_name=container-puppet-glance_api_internal, url=https://www.redhat.com, build-date=2025-11-18T23:45:01Z, architecture=x86_64, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, managed_by=tripleo_ansible, distribution-scope=public, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, name=rhosp17/openstack-glance-api, version=17.1.12, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:12 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:12 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:12 np0005593103 podman[63077]: 2026-01-23 09:10:12.02475706 +0000 UTC m=+0.028102801 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:12 np0005593103 systemd[1]: Started libpod-conmon-90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302.scope. Jan 23 09:10:12 np0005593103 podman[63124]: 2026-01-23 09:10:12.13046559 +0000 UTC m=+0.087177357 container create 1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:51:28Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, url=https://www.redhat.com, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-collectd-container, name=rhosp17/openstack-collectd, description=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.buildah.version=1.41.4, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, container_name=container-puppet-collectd, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64) Jan 23 09:10:12 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3c923cf68b3f5ab8e918a52bc56b2d9f7e5d6db2e596b93e54bd1c3bcc180208/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:12 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e6dc9b4d4f9a02bd2cf0899a9a02ac901a87f01c06e4d8c8419796d12789ecc7/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:12 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:12 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/dc04c856c6a980cb1cbb1b0272166558c80807d7a3b36a1747e0d2fa4c9819d3/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:12 np0005593103 podman[63092]: 2026-01-23 09:10:12.047140157 +0000 UTC m=+0.040575444 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Jan 23 09:10:12 np0005593103 podman[63084]: 2026-01-23 09:10:12.045881443 +0000 UTC m=+0.041710134 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Jan 23 09:10:12 np0005593103 podman[63086]: 2026-01-23 09:10:12.048447401 +0000 UTC m=+0.041882698 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 09:10:12 np0005593103 podman[63031]: 2026-01-23 09:10:12.154600114 +0000 UTC m=+0.205184496 container init 307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, vcs-type=git, io.buildah.version=1.41.4, distribution-scope=public, build-date=2025-11-18T23:45:01Z, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, com.redhat.component=openstack-glance-api-container, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-glance_api, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp17/openstack-glance-api, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api) Jan 23 09:10:12 np0005593103 podman[63086]: 2026-01-23 09:10:12.156188997 +0000 UTC m=+0.149624264 container init 90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.4, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, container_name=container-puppet-glance_api_internal, architecture=x86_64, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T23:45:01Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vendor=Red Hat, Inc., name=rhosp17/openstack-glance-api) Jan 23 09:10:12 np0005593103 systemd[1]: Started libpod-conmon-1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246.scope. Jan 23 09:10:12 np0005593103 podman[63084]: 2026-01-23 09:10:12.160688616 +0000 UTC m=+0.156517287 container create 69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-19T00:20:06Z, container_name=container-puppet-cinder, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, config_id=tripleo_puppet_step1, version=17.1.12, com.redhat.component=openstack-cinder-api-container, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, name=rhosp17/openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 cinder-api) Jan 23 09:10:12 np0005593103 podman[63031]: 2026-01-23 09:10:12.167457447 +0000 UTC m=+0.218041809 container start 307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, name=rhosp17/openstack-glance-api, url=https://www.redhat.com, version=17.1.12, distribution-scope=public, build-date=2025-11-18T23:45:01Z, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.4, io.openshift.expose-services=, architecture=x86_64, managed_by=tripleo_ansible, container_name=container-puppet-glance_api, tcib_managed=true, release=1761123044) Jan 23 09:10:12 np0005593103 podman[63031]: 2026-01-23 09:10:12.167666393 +0000 UTC m=+0.218250795 container attach 307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, distribution-scope=public, tcib_managed=true, architecture=x86_64, build-date=2025-11-18T23:45:01Z, summary=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-glance-api-container, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-glance-api, container_name=container-puppet-glance_api, vcs-type=git, io.openshift.expose-services=, managed_by=tripleo_ansible, url=https://www.redhat.com, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, vendor=Red Hat, Inc.) Jan 23 09:10:12 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:12 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ddd5f628336325d58266b540b76d81c49cc97d4ea8906571a249f2b537765c0c/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:12 np0005593103 podman[63124]: 2026-01-23 09:10:12.082095539 +0000 UTC m=+0.038807316 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Jan 23 09:10:12 np0005593103 podman[63124]: 2026-01-23 09:10:12.182125919 +0000 UTC m=+0.138837676 container init 1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 collectd, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, vcs-type=git, distribution-scope=public, com.redhat.component=openstack-collectd-container, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 collectd, build-date=2025-11-18T22:51:28Z, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, config_id=tripleo_puppet_step1, name=rhosp17/openstack-collectd, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-collectd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team) Jan 23 09:10:12 np0005593103 podman[63124]: 2026-01-23 09:10:12.197313553 +0000 UTC m=+0.154025340 container start 1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.openshift.expose-services=, name=rhosp17/openstack-collectd, vendor=Red Hat, Inc., vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, com.redhat.component=openstack-collectd-container, config_id=tripleo_puppet_step1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, container_name=container-puppet-collectd, io.buildah.version=1.41.4, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:51:28Z, release=1761123044, maintainer=OpenStack TripleO Team) Jan 23 09:10:12 np0005593103 podman[63124]: 2026-01-23 09:10:12.19757437 +0000 UTC m=+0.154286147 container attach 1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:51:28Z, io.buildah.version=1.41.4, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 collectd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.openshift.expose-services=, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git, config_id=tripleo_puppet_step1, distribution-scope=public, com.redhat.component=openstack-collectd-container, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 collectd, container_name=container-puppet-collectd, maintainer=OpenStack TripleO Team, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:12 np0005593103 podman[63086]: 2026-01-23 09:10:12.216916377 +0000 UTC m=+0.210351654 container start 90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, version=17.1.12, architecture=x86_64, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.4, vendor=Red Hat, Inc., distribution-scope=public, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, build-date=2025-11-18T23:45:01Z, tcib_managed=true, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-glance_api_internal, release=1761123044, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-glance-api, io.openshift.expose-services=) Jan 23 09:10:12 np0005593103 podman[63086]: 2026-01-23 09:10:12.217523953 +0000 UTC m=+0.210959330 container attach 90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T23:45:01Z, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.component=openstack-glance-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, container_name=container-puppet-glance_api_internal, name=rhosp17/openstack-glance-api, release=1761123044, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, vcs-type=git, config_id=tripleo_puppet_step1, version=17.1.12, io.buildah.version=1.41.4, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible) Jan 23 09:10:12 np0005593103 systemd[1]: Started libpod-conmon-b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948.scope. Jan 23 09:10:12 np0005593103 podman[63077]: 2026-01-23 09:10:12.255170558 +0000 UTC m=+0.258516269 container init 98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, batch=17.1_20251118.1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, io.buildah.version=1.41.4, distribution-scope=public, url=https://www.redhat.com, container_name=container-puppet-clustercheck, name=rhosp17/openstack-mariadb, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:12 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:12 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3fce46af5867798463815b0d1103fd9a68d2fe287a44eab342ffe11733b6dca3/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:12 np0005593103 podman[63077]: 2026-01-23 09:10:12.263934811 +0000 UTC m=+0.267280562 container start 98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, maintainer=OpenStack TripleO Team, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, batch=17.1_20251118.1, container_name=container-puppet-clustercheck, description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, tcib_managed=true, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:51:13Z) Jan 23 09:10:12 np0005593103 podman[63077]: 2026-01-23 09:10:12.264158117 +0000 UTC m=+0.267503828 container attach 98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, name=rhosp17/openstack-mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, io.buildah.version=1.41.4, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-clustercheck, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, tcib_managed=true, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com) Jan 23 09:10:12 np0005593103 podman[63092]: 2026-01-23 09:10:12.271698889 +0000 UTC m=+0.265134176 container init b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, name=rhosp17/openstack-ceilometer-central, build-date=2025-11-19T00:11:59Z, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, maintainer=OpenStack TripleO Team, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, release=1761123044, config_id=tripleo_puppet_step1, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, io.buildah.version=1.41.4, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, tcib_managed=true, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, managed_by=tripleo_ansible, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, container_name=container-puppet-ceilometer, version=17.1.12, distribution-scope=public, url=https://www.redhat.com, com.redhat.component=openstack-ceilometer-central-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:12 np0005593103 podman[63092]: 2026-01-23 09:10:12.279088495 +0000 UTC m=+0.272523812 container start b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, description=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:11:59Z, version=17.1.12, architecture=x86_64, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-ceilometer-central, com.redhat.component=openstack-ceilometer-central-container, url=https://www.redhat.com, container_name=container-puppet-ceilometer, config_id=tripleo_puppet_step1, distribution-scope=public, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:12 np0005593103 podman[63092]: 2026-01-23 09:10:12.279688092 +0000 UTC m=+0.273123399 container attach b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, version=17.1.12, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, vcs-type=git, io.openshift.expose-services=, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-ceilometer-central-container, vendor=Red Hat, Inc., container_name=container-puppet-ceilometer, release=1761123044, maintainer=OpenStack TripleO Team, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, tcib_managed=true, build-date=2025-11-19T00:11:59Z, description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, batch=17.1_20251118.1, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-ceilometer-central) Jan 23 09:10:12 np0005593103 systemd[1]: Started libpod-conmon-69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377.scope. Jan 23 09:10:12 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:12 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a25d00c54aae7e71fab8f03828fde21cf78919652a465ad2a3ca5528a13cb8ac/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:12 np0005593103 podman[63084]: 2026-01-23 09:10:12.308310916 +0000 UTC m=+0.304139617 container init 69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, managed_by=tripleo_ansible, version=17.1.12, maintainer=OpenStack TripleO Team, container_name=container-puppet-cinder, build-date=2025-11-19T00:20:06Z, name=rhosp17/openstack-cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vcs-type=git, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, release=1761123044, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711) Jan 23 09:10:12 np0005593103 podman[63084]: 2026-01-23 09:10:12.316622727 +0000 UTC m=+0.312451408 container start 69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 cinder-api, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-cinder, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:20:06Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp17/openstack-cinder-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, version=17.1.12, io.buildah.version=1.41.4, tcib_managed=true, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, architecture=x86_64) Jan 23 09:10:12 np0005593103 podman[63084]: 2026-01-23 09:10:12.319238077 +0000 UTC m=+0.315066768 container attach 69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.12, io.buildah.version=1.41.4, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, name=rhosp17/openstack-cinder-api, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-19T00:20:06Z, maintainer=OpenStack TripleO Team, release=1761123044, io.openshift.expose-services=, com.redhat.component=openstack-cinder-api-container, managed_by=tripleo_ansible, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, url=https://www.redhat.com, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, container_name=container-puppet-cinder, architecture=x86_64) Jan 23 09:10:14 np0005593103 puppet-user[63199]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:14 np0005593103 puppet-user[63199]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:14 np0005593103 puppet-user[63199]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:14 np0005593103 puppet-user[63199]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63199]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:14 np0005593103 puppet-user[63199]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63189]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:14 np0005593103 puppet-user[63189]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:14 np0005593103 puppet-user[63189]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:14 np0005593103 puppet-user[63189]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63187]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:14 np0005593103 puppet-user[63187]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:14 np0005593103 puppet-user[63187]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:14 np0005593103 puppet-user[63187]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63189]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:14 np0005593103 puppet-user[63189]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63187]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:14 np0005593103 puppet-user[63187]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63250]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:14 np0005593103 puppet-user[63250]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:14 np0005593103 puppet-user[63250]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:14 np0005593103 puppet-user[63250]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:14 np0005593103 puppet-user[63236]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:14 np0005593103 puppet-user[63236]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63250]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:14 np0005593103 puppet-user[63250]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63250]: Warning: Scope(Class[Tripleo::Profile::Base::Cinder::Api]): The keymgr_backend parameter has been deprecated and has no effect. Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:14 np0005593103 puppet-user[63236]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63250]: Warning: Scope(Class[Cinder]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:14 np0005593103 puppet-user[63250]: removed in a future realse. Use cinder::db::database_connection instead Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::cache_backend'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 145, column: 39) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::memcache_servers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 146, column: 39) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::cache_tls_enabled'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 147, column: 39) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::cache_tls_cafile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 148, column: 39) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::cache_tls_certfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 149, column: 39) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::cache_tls_keyfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 150, column: 39) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::cache_tls_allowed_ciphers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 151, column: 39) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::manage_backend_package'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 152, column: 39) Jan 23 09:10:14 np0005593103 puppet-user[63250]: Warning: Unknown variable: 'cinder::api::keymgr_backend'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 455, column: 31) Jan 23 09:10:14 np0005593103 puppet-user[63250]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_api_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 456, column: 42) Jan 23 09:10:14 np0005593103 puppet-user[63250]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_auth_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 458, column: 43) Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.41 seconds Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_password'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 63, column: 25) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_url'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 68, column: 25) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_region'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 69, column: 28) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 70, column: 25) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_tenant_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 71, column: 29) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_cacert'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 72, column: 23) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_endpoint_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 73, column: 26) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 74, column: 33) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_project_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 75, column: 36) Jan 23 09:10:14 np0005593103 puppet-user[63236]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 76, column: 26) Jan 23 09:10:14 np0005593103 puppet-user[63231]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:14 np0005593103 puppet-user[63231]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:14 np0005593103 puppet-user[63231]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:14 np0005593103 puppet-user[63231]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/content: content changed '{sha256}aea388a73ebafc7e07a81ddb930a91099211f660eee55fbf92c13007a77501e5' to '{sha256}2523d01ee9c3022c0e9f61d896b1474a168e18472aee141cc278e69fe13f41c1' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/owner: owner changed 'collectd' to 'root' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/group: group changed 'collectd' to 'root' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/mode: mode changed '0644' to '0640' Jan 23 09:10:14 np0005593103 puppet-user[63231]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:14 np0005593103 puppet-user[63231]: (file & line not available) Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/owner: owner changed 'collectd' to 'root' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/group: group changed 'collectd' to 'root' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/mode: mode changed '0755' to '0750' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-cpu.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-interface.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-load.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-memory.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-syslog.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/apache.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/dns.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ipmi.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63231]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.08 seconds Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mcelog.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mysql.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-events.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-stats.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ping.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/pmu.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/rdt.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/sensors.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/snmp.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/virt.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/write_prometheus.conf]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Python/File[/usr/lib/python3.9/site-packages]/mode: mode changed '0755' to '0750' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Python/Collectd::Plugin[python]/File[python.load]/ensure: defined content as '{sha256}0163924a0099dd43fe39cb85e836df147fd2cfee8197dc6866d3c384539eb6ee' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Python/Concat[/etc/collectd.d/python-config.conf]/File[/etc/collectd.d/python-config.conf]/ensure: defined content as '{sha256}2e5fb20e60b30f84687fc456a37fc62451000d2d85f5bbc1b3fca3a5eac9deeb' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Logfile/Collectd::Plugin[logfile]/File[logfile.load]/ensure: defined content as '{sha256}07bbda08ef9b824089500bdc6ac5a86e7d1ef2ae3ed4ed423c0559fe6361e5af' Jan 23 09:10:14 np0005593103 puppet-user[63231]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}253fd23a9457bf7b502822682300170dfaf6edef60250431b0c0b57994772ed6' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Amqp1/Collectd::Plugin[amqp1]/File[amqp1.load]/ensure: defined content as '{sha256}0a0a0c34274f275b8970cc3156d0c892aac464f2f22050f0f98a3290e82a97cd' Jan 23 09:10:14 np0005593103 puppet-user[63231]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.d]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63231]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.conf]/ensure: defined content as '{sha256}37f48d3e5dce056a46519d144042a388bde95ea9fa161d3362eedf70e7987a91' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Cpu/Collectd::Plugin[cpu]/File[cpu.load]/ensure: defined content as '{sha256}67d4c8bf6bf5785f4cb6b596712204d9eacbcebbf16fe289907195d4d3cb0e34' Jan 23 09:10:14 np0005593103 puppet-user[63231]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/Xinetd::Service[galera-monitor]/File[/etc/xinetd.d/galera-monitor]/ensure: defined content as '{sha256}fd21593539aa04bcfd2d4305d9076d8e0e3ab6984a3f98adca51feb2428cb9ba' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Df/Collectd::Plugin[df]/File[df.load]/ensure: defined content as '{sha256}edeb4716d96fc9dca2c6adfe07bae70ba08c6af3944a3900581cba0f08f3c4ba' Jan 23 09:10:14 np0005593103 puppet-user[63231]: Notice: Applied catalog in 0.03 seconds Jan 23 09:10:14 np0005593103 puppet-user[63231]: Application: Jan 23 09:10:14 np0005593103 puppet-user[63231]: Initial environment: production Jan 23 09:10:14 np0005593103 puppet-user[63231]: Converged environment: production Jan 23 09:10:14 np0005593103 puppet-user[63231]: Run mode: user Jan 23 09:10:14 np0005593103 puppet-user[63231]: Changes: Jan 23 09:10:14 np0005593103 puppet-user[63231]: Total: 4 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Events: Jan 23 09:10:14 np0005593103 puppet-user[63231]: Success: 4 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Total: 4 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Resources: Jan 23 09:10:14 np0005593103 puppet-user[63231]: Changed: 4 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Out of sync: 4 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Skipped: 9 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Total: 13 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Time: Jan 23 09:10:14 np0005593103 puppet-user[63231]: File: 0.02 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Transaction evaluation: 0.03 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Catalog application: 0.03 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Config retrieval: 0.12 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Last run: 1769159414 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Total: 0.03 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Version: Jan 23 09:10:14 np0005593103 puppet-user[63231]: Config: 1769159414 Jan 23 09:10:14 np0005593103 puppet-user[63231]: Puppet: 7.10.0 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Disk/Collectd::Plugin[disk]/File[disk.load]/ensure: defined content as '{sha256}1d0cb838278f3226fcd381f0fc2e0e1abaf0d590f4ba7bcb2fc6ec113d3ebde7' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[hugepages.load]/ensure: defined content as '{sha256}9b9f35b65a73da8d4037e4355a23b678f2cf61997ccf7a5e1adf2a7ce6415827' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[older_hugepages.load]/ensure: removed Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Interface/Collectd::Plugin[interface]/File[interface.load]/ensure: defined content as '{sha256}b76b315dc312e398940fe029c6dbc5c18d2b974ff7527469fc7d3617b5222046' Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.48 seconds Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Load/Collectd::Plugin[load]/File[load.load]/ensure: defined content as '{sha256}af2403f76aebd2f10202d66d2d55e1a8d987eed09ced5a3e3873a4093585dc31' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Memory/Collectd::Plugin[memory]/File[memory.load]/ensure: defined content as '{sha256}0f270425ee6b05fc9440ee32b9afd1010dcbddd9b04ca78ff693858f7ecb9d0e' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Unixsock/Collectd::Plugin[unixsock]/File[unixsock.load]/ensure: defined content as '{sha256}9d1ec1c51ba386baa6f62d2e019dbd6998ad924bf868b3edc2d24d3dc3c63885' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Uptime/Collectd::Plugin[uptime]/File[uptime.load]/ensure: defined content as '{sha256}f7a26c6369f904d0ca1af59627ebea15f5e72160bcacdf08d217af282b42e5c0' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: /Stage[main]/Collectd::Plugin::Memcached/Collectd::Plugin[memcached]/File[memcached.load]/ensure: defined content as '{sha256}09023fb6c5f8101b9893fc6a7e29879ac42bdf20bd779bee49b4e243220b6277' Jan 23 09:10:14 np0005593103 puppet-user[63199]: Notice: Applied catalog in 0.20 seconds Jan 23 09:10:14 np0005593103 puppet-user[63199]: Application: Jan 23 09:10:14 np0005593103 puppet-user[63199]: Initial environment: production Jan 23 09:10:14 np0005593103 puppet-user[63199]: Converged environment: production Jan 23 09:10:14 np0005593103 puppet-user[63199]: Run mode: user Jan 23 09:10:14 np0005593103 puppet-user[63199]: Changes: Jan 23 09:10:14 np0005593103 puppet-user[63199]: Total: 42 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Events: Jan 23 09:10:14 np0005593103 puppet-user[63199]: Success: 42 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Total: 42 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Resources: Jan 23 09:10:14 np0005593103 puppet-user[63199]: Skipped: 12 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Changed: 37 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Out of sync: 37 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Total: 77 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Time: Jan 23 09:10:14 np0005593103 puppet-user[63199]: Concat fragment: 0.00 Jan 23 09:10:14 np0005593103 puppet-user[63199]: File: 0.09 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Transaction evaluation: 0.19 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Catalog application: 0.20 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Config retrieval: 0.49 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Last run: 1769159414 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Concat file: 0.00 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Total: 0.20 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Version: Jan 23 09:10:14 np0005593103 puppet-user[63199]: Config: 1769159414 Jan 23 09:10:14 np0005593103 puppet-user[63199]: Puppet: 7.10.0 Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/http_timeout]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/host]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[publisher/telemetry_secret]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_name]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_password]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_url]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/region_name]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/username]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/password]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_name]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/interface]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/user_domain_name]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_domain_name]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_type]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[DEFAULT/polling_namespaces]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[polling/tenant_name_discovery]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[coordination/backend_url]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63187]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Jan 23 09:10:14 np0005593103 puppet-user[63187]: glance::backend::multistore::cinder::cinder_os_region_name instead. Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Agent::Notification/File[event_pipeline]/ensure: defined content as '{sha256}97b000582d6be7fd4e80bc1fc15bc0358888fdea71d4447491d8c683cd09e21b' Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/backend]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/enabled]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/memcache_servers]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63189]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Jan 23 09:10:14 np0005593103 puppet-user[63189]: glance::backend::multistore::cinder::cinder_os_region_name instead. Jan 23 09:10:14 np0005593103 puppet-user[63189]: Warning: Scope(Class[Glance::Api]): The show_multiple_locations parameter is deprecated, and will be removed in a future release Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/tls_enabled]/ensure: created Jan 23 09:10:14 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Rabbit[ceilometer_config]/Ceilometer_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/rpc_address_prefix]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/notify_address_prefix]/ensure: created Jan 23 09:10:15 np0005593103 systemd[1]: libpod-98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699.scope: Deactivated successfully. Jan 23 09:10:15 np0005593103 systemd[1]: libpod-98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699.scope: Consumed 2.677s CPU time. Jan 23 09:10:15 np0005593103 podman[63077]: 2026-01-23 09:10:15.034445599 +0000 UTC m=+3.037791370 container died 98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, version=17.1.12, build-date=2025-11-18T22:51:13Z, managed_by=tripleo_ansible, vendor=Red Hat, Inc., tcib_managed=true, release=1761123044, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1, container_name=container-puppet-clustercheck, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-mariadb, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, com.redhat.component=openstack-mariadb-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:15 np0005593103 puppet-user[63250]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/backup.pp, line: 94, column: 18) Jan 23 09:10:15 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:15 np0005593103 systemd[1]: var-lib-containers-storage-overlay-3c923cf68b3f5ab8e918a52bc56b2d9f7e5d6db2e596b93e54bd1c3bcc180208-merged.mount: Deactivated successfully. Jan 23 09:10:15 np0005593103 systemd[1]: libpod-1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246.scope: Deactivated successfully. Jan 23 09:10:15 np0005593103 systemd[1]: libpod-1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246.scope: Consumed 2.770s CPU time. Jan 23 09:10:15 np0005593103 podman[63124]: 2026-01-23 09:10:15.117750012 +0000 UTC m=+3.074461819 container died 1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 collectd, container_name=container-puppet-collectd, tcib_managed=true, name=rhosp17/openstack-collectd, com.redhat.component=openstack-collectd-container, build-date=2025-11-18T22:51:28Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 collectd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, distribution-scope=public, batch=17.1_20251118.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, release=1761123044, version=17.1.12, url=https://www.redhat.com, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd) Jan 23 09:10:15 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63250]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/volume.pp, line: 69, column: 18) Jan 23 09:10:15 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/topics]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Default[ceilometer_config]/Ceilometer_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:15 np0005593103 podman[63719]: 2026-01-23 09:10:15.16078978 +0000 UTC m=+0.114756773 container cleanup 98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, build-date=2025-11-18T22:51:13Z, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, release=1761123044, batch=17.1_20251118.1, architecture=x86_64, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, container_name=container-puppet-clustercheck, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc.) Jan 23 09:10:15 np0005593103 systemd[1]: libpod-conmon-98f2edaedd5c15d3e7f2e4f622872600cd950ef6f2ff7e8c1f3a8dd4cd94f699.scope: Deactivated successfully. Jan 23 09:10:15 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-clustercheck --conmon-pidfile /run/container-puppet-clustercheck.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=clustercheck --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::pacemaker::clustercheck --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-clustercheck --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-clustercheck.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/debug]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63236]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:15 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:15 np0005593103 podman[63744]: 2026-01-23 09:10:15.220321478 +0000 UTC m=+0.087145326 container cleanup 1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, release=1761123044, container_name=container-puppet-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, url=https://www.redhat.com, build-date=2025-11-18T22:51:28Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-collectd, vcs-type=git, io.buildah.version=1.41.4, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container) Jan 23 09:10:15 np0005593103 puppet-user[63236]: Notice: Applied catalog in 0.45 seconds Jan 23 09:10:15 np0005593103 puppet-user[63236]: Application: Jan 23 09:10:15 np0005593103 puppet-user[63236]: Initial environment: production Jan 23 09:10:15 np0005593103 puppet-user[63236]: Converged environment: production Jan 23 09:10:15 np0005593103 puppet-user[63236]: Run mode: user Jan 23 09:10:15 np0005593103 puppet-user[63236]: Changes: Jan 23 09:10:15 np0005593103 puppet-user[63236]: Total: 31 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Events: Jan 23 09:10:15 np0005593103 puppet-user[63236]: Success: 31 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Total: 31 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Resources: Jan 23 09:10:15 np0005593103 puppet-user[63236]: Skipped: 24 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Changed: 31 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Out of sync: 31 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Total: 157 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Time: Jan 23 09:10:15 np0005593103 puppet-user[63236]: File: 0.00 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Ceilometer config: 0.37 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Transaction evaluation: 0.44 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Catalog application: 0.45 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Config retrieval: 0.57 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Last run: 1769159415 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Resources: 0.00 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Total: 0.45 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Version: Jan 23 09:10:15 np0005593103 puppet-user[63236]: Config: 1769159414 Jan 23 09:10:15 np0005593103 puppet-user[63236]: Puppet: 7.10.0 Jan 23 09:10:15 np0005593103 systemd[1]: libpod-conmon-1d196b3b9b06085ff1d545ae85057931700628f56cdf624367918d6f271b3246.scope: Deactivated successfully. Jan 23 09:10:15 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-collectd --conmon-pidfile /run/container-puppet-collectd.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,collectd_client_config,exec --env NAME=collectd --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::collectd --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-collectd --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-collectd.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Jan 23 09:10:15 np0005593103 puppet-user[63189]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Jan 23 09:10:15 np0005593103 puppet-user[63187]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Jan 23 09:10:15 np0005593103 puppet-user[63189]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Jan 23 09:10:15 np0005593103 puppet-user[63189]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:15 np0005593103 puppet-user[63189]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:15 np0005593103 puppet-user[63189]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:15 np0005593103 puppet-user[63189]: file names. Jan 23 09:10:15 np0005593103 puppet-user[63189]: Jan 23 09:10:15 np0005593103 puppet-user[63189]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:15 np0005593103 puppet-user[63189]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:15 np0005593103 puppet-user[63189]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:15 np0005593103 puppet-user[63187]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Jan 23 09:10:15 np0005593103 puppet-user[63187]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:15 np0005593103 puppet-user[63187]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:15 np0005593103 puppet-user[63187]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:15 np0005593103 puppet-user[63187]: file names. Jan 23 09:10:15 np0005593103 puppet-user[63187]: Jan 23 09:10:15 np0005593103 puppet-user[63187]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:15 np0005593103 puppet-user[63187]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:15 np0005593103 puppet-user[63187]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:15 np0005593103 podman[63872]: 2026-01-23 09:10:15.612208045 +0000 UTC m=+0.067474711 container create 14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., com.redhat.component=openstack-haproxy-container, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, tcib_managed=true, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, version=17.1.12, description=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, name=rhosp17/openstack-haproxy, url=https://www.redhat.com, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 haproxy, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-haproxy, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, build-date=2025-11-18T22:50:48Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:15 np0005593103 podman[63871]: 2026-01-23 09:10:15.621464353 +0000 UTC m=+0.081545238 container create ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, io.buildah.version=1.41.4, version=17.1.12, name=rhosp17/openstack-heat-api, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, build-date=2025-11-19T00:11:00Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, batch=17.1_20251118.1, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, container_name=container-puppet-heat_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible) Jan 23 09:10:15 np0005593103 systemd[1]: Started libpod-conmon-14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53.scope. Jan 23 09:10:15 np0005593103 systemd[1]: Started libpod-conmon-ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364.scope. Jan 23 09:10:15 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:15 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:15 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3ffb220a9c202d2c9d99a8efa6f9a7f4ef3407da3329c5696d0778de6dc9967d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:15 np0005593103 puppet-user[63250]: Warning: Scope(Apache::Vhost[cinder_wsgi]): Jan 23 09:10:15 np0005593103 puppet-user[63250]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:15 np0005593103 puppet-user[63250]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:15 np0005593103 puppet-user[63250]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:15 np0005593103 puppet-user[63250]: file names. Jan 23 09:10:15 np0005593103 puppet-user[63250]: Jan 23 09:10:15 np0005593103 puppet-user[63250]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:15 np0005593103 puppet-user[63250]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:15 np0005593103 puppet-user[63250]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:15 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/51b8f9329546def44f0cee1dac003e5092ba7c2256cd0e8ed1156f32862c86db/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:15 np0005593103 podman[63871]: 2026-01-23 09:10:15.671566569 +0000 UTC m=+0.131647454 container init ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, tcib_managed=true, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, url=https://www.redhat.com, io.openshift.expose-services=, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, batch=17.1_20251118.1, com.redhat.component=openstack-heat-api-container, vcs-type=git, container_name=container-puppet-heat_api, version=17.1.12, description=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, build-date=2025-11-19T00:11:00Z, vendor=Red Hat, Inc.) Jan 23 09:10:15 np0005593103 podman[63872]: 2026-01-23 09:10:15.574875069 +0000 UTC m=+0.030141725 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Jan 23 09:10:15 np0005593103 podman[63872]: 2026-01-23 09:10:15.675304639 +0000 UTC m=+0.130571325 container init 14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-haproxy, architecture=x86_64, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.component=openstack-haproxy-container, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, build-date=2025-11-18T22:50:48Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, name=rhosp17/openstack-haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044) Jan 23 09:10:15 np0005593103 systemd[1]: libpod-b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948.scope: Deactivated successfully. Jan 23 09:10:15 np0005593103 systemd[1]: libpod-b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948.scope: Consumed 3.227s CPU time. Jan 23 09:10:15 np0005593103 podman[63871]: 2026-01-23 09:10:15.68133413 +0000 UTC m=+0.141415015 container start ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, batch=17.1_20251118.1, release=1761123044, container_name=container-puppet-heat_api, url=https://www.redhat.com, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, version=17.1.12, description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-19T00:11:00Z, managed_by=tripleo_ansible, com.redhat.component=openstack-heat-api-container, vcs-type=git, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, tcib_managed=true, architecture=x86_64, distribution-scope=public, name=rhosp17/openstack-heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:15 np0005593103 podman[63871]: 2026-01-23 09:10:15.581543897 +0000 UTC m=+0.041624812 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 09:10:15 np0005593103 podman[63871]: 2026-01-23 09:10:15.681552816 +0000 UTC m=+0.141633701 container attach ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, io.buildah.version=1.41.4, batch=17.1_20251118.1, url=https://www.redhat.com, version=17.1.12, com.redhat.component=openstack-heat-api-container, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, container_name=container-puppet-heat_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-11-19T00:11:00Z, tcib_managed=true, name=rhosp17/openstack-heat-api, release=1761123044, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, vendor=Red Hat, Inc., org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:15 np0005593103 podman[63092]: 2026-01-23 09:10:15.682350027 +0000 UTC m=+3.675785324 container died b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, build-date=2025-11-19T00:11:59Z, release=1761123044, io.openshift.expose-services=, tcib_managed=true, batch=17.1_20251118.1, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, url=https://www.redhat.com, vcs-type=git, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_puppet_step1, distribution-scope=public, name=rhosp17/openstack-ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-ceilometer, description=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, managed_by=tripleo_ansible, architecture=x86_64, com.redhat.component=openstack-ceilometer-central-container) Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.61 seconds Jan 23 09:10:15 np0005593103 puppet-user[63187]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.63 seconds Jan 23 09:10:15 np0005593103 podman[63934]: 2026-01-23 09:10:15.759509306 +0000 UTC m=+0.065980192 container cleanup b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, url=https://www.redhat.com, version=17.1.12, managed_by=tripleo_ansible, release=1761123044, tcib_managed=true, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, batch=17.1_20251118.1, name=rhosp17/openstack-ceilometer-central, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2025-11-19T00:11:59Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, architecture=x86_64, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, maintainer=OpenStack TripleO Team, vcs-type=git, vendor=Red Hat, Inc., com.redhat.component=openstack-ceilometer-central-container, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.4, container_name=container-puppet-ceilometer, description=Red Hat OpenStack Platform 17.1 ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central) Jan 23 09:10:15 np0005593103 systemd[1]: libpod-conmon-b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948.scope: Deactivated successfully. Jan 23 09:10:15 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ceilometer --conmon-pidfile /run/container-puppet-ceilometer.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config --env NAME=ceilometer --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::ceilometer::agent::polling#012#012include tripleo::profile::base::ceilometer::agent::notification#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ceilometer --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ceilometer.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Jan 23 09:10:15 np0005593103 podman[63872]: 2026-01-23 09:10:15.786482465 +0000 UTC m=+0.241749171 container start 14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., release=1761123044, vcs-type=git, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp17/openstack-haproxy, container_name=container-puppet-haproxy, version=17.1.12, io.buildah.version=1.41.4, tcib_managed=true, build-date=2025-11-18T22:50:48Z, architecture=x86_64, batch=17.1_20251118.1, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy) Jan 23 09:10:15 np0005593103 podman[63872]: 2026-01-23 09:10:15.787276287 +0000 UTC m=+0.242542973 container attach 14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-haproxy, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, batch=17.1_20251118.1, io.openshift.expose-services=, architecture=x86_64, name=rhosp17/openstack-haproxy, build-date=2025-11-18T22:50:48Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, com.redhat.component=openstack-haproxy-container, url=https://www.redhat.com, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 haproxy) Jan 23 09:10:15 np0005593103 puppet-user[63250]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.61 seconds Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}81afac3432a9660887efb2b5b85077708be3fbd608765e79b14f9aa0f2eb034e' Jan 23 09:10:15 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:15 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:15 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:15 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:15 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}dd339edf7197b62aa1314bd8c6a5ce6a8e6042810fea3df899aac35b98b24fc9' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:16 np0005593103 systemd[1]: var-lib-containers-storage-overlay-ddd5f628336325d58266b540b76d81c49cc97d4ea8906571a249f2b537765c0c-merged.mount: Deactivated successfully. Jan 23 09:10:16 np0005593103 systemd[1]: var-lib-containers-storage-overlay-3fce46af5867798463815b0d1103fd9a68d2fe287a44eab342ffe11733b6dca3-merged.mount: Deactivated successfully. Jan 23 09:10:16 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-b07caf88d9e3717a7254d213c21d72ea69e6c1b7087e1add76f51794f9b92948-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:16 np0005593103 podman[64031]: 2026-01-23 09:10:16.197678708 +0000 UTC m=+0.096329371 container create ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, com.redhat.component=openstack-heat-api-cfn-container, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, tcib_managed=true, version=17.1.12, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-heat-api-cfn, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, managed_by=tripleo_ansible, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, build-date=2025-11-19T00:10:53Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn) Jan 23 09:10:16 np0005593103 systemd[1]: Started libpod-conmon-ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8.scope. Jan 23 09:10:16 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:16 np0005593103 podman[64031]: 2026-01-23 09:10:16.153266072 +0000 UTC m=+0.051916745 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Jan 23 09:10:16 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/462dbf549efe6fbeb15f94b0b9778709160f16b7122493f4211d3d8d31778eed/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:16 np0005593103 podman[64031]: 2026-01-23 09:10:16.270698096 +0000 UTC m=+0.169348759 container init ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, release=1761123044, com.redhat.component=openstack-heat-api-cfn-container, io.openshift.expose-services=, distribution-scope=public, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., tcib_managed=true, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, architecture=x86_64, managed_by=tripleo_ansible, version=17.1.12, container_name=container-puppet-heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, build-date=2025-11-19T00:10:53Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, name=rhosp17/openstack-heat-api-cfn, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:16 np0005593103 podman[64031]: 2026-01-23 09:10:16.289150259 +0000 UTC m=+0.187800922 container start ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, maintainer=OpenStack TripleO Team, container_name=container-puppet-heat_api_cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.expose-services=, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public, managed_by=tripleo_ansible, tcib_managed=true, batch=17.1_20251118.1, name=rhosp17/openstack-heat-api-cfn, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, com.redhat.component=openstack-heat-api-cfn-container, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.12, url=https://www.redhat.com, vendor=Red Hat, Inc., build-date=2025-11-19T00:10:53Z) Jan 23 09:10:16 np0005593103 podman[64031]: 2026-01-23 09:10:16.289762655 +0000 UTC m=+0.188413328 container attach ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, container_name=container-puppet-heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-heat-api-cfn, build-date=2025-11-19T00:10:53Z, distribution-scope=public, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., url=https://www.redhat.com, tcib_managed=true, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20251118.1, com.redhat.component=openstack-heat-api-cfn-container, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Lvm/Augeas[udev options in lvm.conf]/returns: executed successfully Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}f4fe6f8f28e40ae075bc495e8315cd6ba7487200870270aa7aac90867f00f681' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/api_paste_config]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/storage_availability_zone]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/default_availability_zone]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/enable_v3_api]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Glance/Cinder_config[DEFAULT/glance_api_servers]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:16 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/region_name]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/interface]/ensure: created Jan 23 09:10:17 np0005593103 systemd[1]: tmp-crun.juNI9b.mount: Deactivated successfully. Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_type]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_url]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/username]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/user_domain_name]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/password]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_name]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_domain_name]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}c8122b0d284b09f012a410ff4e7d0ecba2dca10a1b7b2c1d5ea41a61628d2def' Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}5aafd8351bfa9e45c2e78b545640aefda01b6a8330c3814e6c11535489e0836b' Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Cron::Db_purge/Cron[cinder-manage db purge]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_listen]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_workers]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/default_volume_type]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/auth_strategy]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_workers]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_max_operations]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_driver]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/swift_catalog_info]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_swift_container]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63967]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_compression_algorithm]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Scheduler/Cinder_config[DEFAULT/scheduler_driver]/ensure: created Jan 23 09:10:17 np0005593103 ovs-vsctl[64110]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[DEFAULT/enabled_backends]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[tripleo_iscsi/backend_host]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/connection]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Notice: Applied catalog in 1.81 seconds Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/max_retries]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63187]: Application: Jan 23 09:10:17 np0005593103 puppet-user[63187]: Initial environment: production Jan 23 09:10:17 np0005593103 puppet-user[63187]: Converged environment: production Jan 23 09:10:17 np0005593103 puppet-user[63187]: Run mode: user Jan 23 09:10:17 np0005593103 puppet-user[63187]: Changes: Jan 23 09:10:17 np0005593103 puppet-user[63187]: Total: 92 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Events: Jan 23 09:10:17 np0005593103 puppet-user[63187]: Success: 92 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Total: 92 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Resources: Jan 23 09:10:17 np0005593103 puppet-user[63187]: Skipped: 36 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Changed: 92 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Out of sync: 92 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Total: 305 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Time: Jan 23 09:10:17 np0005593103 puppet-user[63187]: Anchor: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Concat file: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Concat fragment: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Glance image import config: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Glance swift config: 0.01 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Cron: 0.01 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Glance cache config: 0.01 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Augeas: 0.02 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Package: 0.02 Jan 23 09:10:17 np0005593103 puppet-user[63187]: File: 0.11 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Glance api config: 1.39 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Config retrieval: 1.77 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Transaction evaluation: 1.79 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Catalog application: 1.81 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Last run: 1769159417 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Resources: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Total: 1.81 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Version: Jan 23 09:10:17 np0005593103 puppet-user[63187]: Config: 1769159414 Jan 23 09:10:17 np0005593103 puppet-user[63187]: Puppet: 7.10.0 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63189]: Notice: Applied catalog in 1.89 seconds Jan 23 09:10:17 np0005593103 puppet-user[63189]: Application: Jan 23 09:10:17 np0005593103 puppet-user[63189]: Initial environment: production Jan 23 09:10:17 np0005593103 puppet-user[63189]: Converged environment: production Jan 23 09:10:17 np0005593103 puppet-user[63189]: Run mode: user Jan 23 09:10:17 np0005593103 puppet-user[63189]: Changes: Jan 23 09:10:17 np0005593103 puppet-user[63189]: Total: 92 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Events: Jan 23 09:10:17 np0005593103 puppet-user[63189]: Success: 92 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Total: 92 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Resources: Jan 23 09:10:17 np0005593103 puppet-user[63189]: Skipped: 36 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Changed: 92 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Out of sync: 92 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Total: 305 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Time: Jan 23 09:10:17 np0005593103 puppet-user[63189]: Concat file: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Anchor: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Concat fragment: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Glance image import config: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Glance swift config: 0.01 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Cron: 0.01 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Glance cache config: 0.01 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Augeas: 0.02 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Package: 0.03 Jan 23 09:10:17 np0005593103 puppet-user[63189]: File: 0.11 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Glance api config: 1.46 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Config retrieval: 1.75 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Transaction evaluation: 1.88 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Catalog application: 1.89 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Last run: 1769159417 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Resources: 0.00 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Total: 1.89 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Version: Jan 23 09:10:17 np0005593103 puppet-user[63189]: Config: 1769159414 Jan 23 09:10:17 np0005593103 puppet-user[63189]: Puppet: 7.10.0 Jan 23 09:10:17 np0005593103 puppet-user[63965]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:17 np0005593103 puppet-user[63965]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:17 np0005593103 puppet-user[63965]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:17 np0005593103 puppet-user[63965]: (file & line not available) Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/db_max_retries]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63965]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:17 np0005593103 puppet-user[63965]: (file & line not available) Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:17 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63965]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:18 np0005593103 puppet-user[63965]: removed in a future realse. Use heat::db::database_connection instead Jan 23 09:10:18 np0005593103 ovs-vsctl[64248]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:18 np0005593103 puppet-user[63967]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:18 np0005593103 puppet-user[63967]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:18 np0005593103 puppet-user[63967]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:18 np0005593103 puppet-user[63967]: (file & line not available) Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/rpc_response_timeout]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63967]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:18 np0005593103 puppet-user[63967]: (file & line not available) Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[64067]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:18 np0005593103 puppet-user[64067]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:18 np0005593103 puppet-user[64067]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:18 np0005593103 puppet-user[64067]: (file & line not available) Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/control_exchange]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:18 np0005593103 systemd[1]: libpod-307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c.scope: Deactivated successfully. Jan 23 09:10:18 np0005593103 systemd[1]: libpod-307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c.scope: Consumed 5.965s CPU time. Jan 23 09:10:18 np0005593103 puppet-user[64067]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:18 np0005593103 puppet-user[64067]: (file & line not available) Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:18 np0005593103 podman[63031]: 2026-01-23 09:10:18.351622913 +0000 UTC m=+6.402207295 container died 307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, config_id=tripleo_puppet_step1, build-date=2025-11-18T23:45:01Z, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, name=rhosp17/openstack-glance-api, url=https://www.redhat.com, container_name=container-puppet-glance_api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, batch=17.1_20251118.1, com.redhat.component=openstack-glance-api-container, distribution-scope=public, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.openshift.expose-services=, release=1761123044) Jan 23 09:10:18 np0005593103 systemd[1]: libpod-90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302.scope: Deactivated successfully. Jan 23 09:10:18 np0005593103 systemd[1]: libpod-90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302.scope: Consumed 5.917s CPU time. Jan 23 09:10:18 np0005593103 podman[63086]: 2026-01-23 09:10:18.36726537 +0000 UTC m=+6.360700657 container died 90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, vcs-type=git, build-date=2025-11-18T23:45:01Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, release=1761123044, io.openshift.expose-services=, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-glance_api_internal, name=rhosp17/openstack-glance-api, managed_by=tripleo_ansible, version=17.1.12, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, com.redhat.component=openstack-glance-api-container) Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder/Oslo::Concurrency[cinder_config]/Cinder_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/debug]/ensure: created Jan 23 09:10:18 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:18 np0005593103 systemd[1]: var-lib-containers-storage-overlay-e6dc9b4d4f9a02bd2cf0899a9a02ac901a87f01c06e4d8c8419796d12789ecc7-merged.mount: Deactivated successfully. Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_type]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[64067]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:18 np0005593103 puppet-user[64067]: removed in a future realse. Use heat::db::database_connection instead Jan 23 09:10:18 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/region_name]/ensure: created Jan 23 09:10:18 np0005593103 podman[64355]: 2026-01-23 09:10:18.598934142 +0000 UTC m=+0.241308930 container cleanup 307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, batch=17.1_20251118.1, tcib_managed=true, name=rhosp17/openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, build-date=2025-11-18T23:45:01Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, release=1761123044, vcs-type=git, container_name=container-puppet-glance_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, vendor=Red Hat, Inc., org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, com.redhat.component=openstack-glance-api-container) Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_url]/ensure: created Jan 23 09:10:18 np0005593103 podman[64365]: 2026-01-23 09:10:18.607736267 +0000 UTC m=+0.229334990 container cleanup 90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, name=rhosp17/openstack-glance-api, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-glance-api-container, distribution-scope=public, version=17.1.12, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, build-date=2025-11-18T23:45:01Z, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, container_name=container-puppet-glance_api_internal, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1761123044, vendor=Red Hat, Inc., url=https://www.redhat.com, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:18 np0005593103 systemd[1]: libpod-conmon-307ffd21bde64f0b2dfd8a5c2a99fca604afef9bfe7b074e258e6df589576e6c.scope: Deactivated successfully. Jan 23 09:10:18 np0005593103 systemd[1]: libpod-conmon-90f41eb1d4eac13ef3f6306252b92224a96b5874cc0f0e133c3c79ce120ce302.scope: Deactivated successfully. Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/username]/ensure: created Jan 23 09:10:18 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api --conmon-pidfile /run/container-puppet-glance_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::glance::api#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 09:10:18 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api_internal --conmon-pidfile /run/container-puppet-glance_api_internal.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api_internal --env STEP_CONFIG=include ::tripleo::packages#012class { 'tripleo::profile::base::glance::api':#012 bind_port => 9293,#012 tls_proxy_port => 9293,#012 log_file => '/var/log/glance/api_internal.log',#012 show_image_direct_url => true,#012 show_multiple_locations => true,#012}#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api_internal --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api_internal.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/password]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/user_domain_name]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_name]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_domain_name]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/send_service_user_token]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63967]: Warning: Scope(Haproxy::Config[haproxy]): haproxy: The $merge_options parameter will default to true in the next major release. Please review the documentation regarding the implications. Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63967]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.79 seconds Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:18 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Policy/Oslo::Policy[cinder_config]/Cinder_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Warning: Scope(Apache::Vhost[heat_api_wsgi]): Jan 23 09:10:19 np0005593103 puppet-user[63965]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:19 np0005593103 puppet-user[63965]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:19 np0005593103 puppet-user[63965]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:19 np0005593103 puppet-user[63965]: file names. Jan 23 09:10:19 np0005593103 puppet-user[63965]: Jan 23 09:10:19 np0005593103 puppet-user[63965]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:19 np0005593103 puppet-user[63965]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:19 np0005593103 puppet-user[63965]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Api/Oslo::Middleware[cinder_config]/Cinder_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[/var/www/cgi-bin/cinder]/group: group changed 'root' to 'cinder' Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[cinder_wsgi]/ensure: defined content as '{sha256}4edb31cc3eee33c28f8a9c6c47aaad65265bca7f5a84782e4481666691daacea' Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_backend_name]/ensure: created Jan 23 09:10:19 np0005593103 podman[64475]: 2026-01-23 09:10:19.100733422 +0000 UTC m=+0.125737106 container create c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, architecture=x86_64, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, tcib_managed=true, vcs-type=git, container_name=container-puppet-heat, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-11-19T00:11:00Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-heat-api, release=1761123044, distribution-scope=public, com.redhat.component=openstack-heat-api-container, url=https://www.redhat.com, io.buildah.version=1.41.4) Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_driver]/ensure: created Jan 23 09:10:19 np0005593103 podman[64475]: 2026-01-23 09:10:19.007186385 +0000 UTC m=+0.032190129 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_ip_address]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_helper]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volumes_dir]/ensure: created Jan 23 09:10:19 np0005593103 systemd[1]: Started libpod-conmon-c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc.scope. Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_protocol]/ensure: created Jan 23 09:10:19 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:19 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/508d031f6ed17bf7e5b2fe70fa150229833af8001ef650456fd976995cffe826/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:19 np0005593103 podman[64493]: 2026-01-23 09:10:19.160279451 +0000 UTC m=+0.128754977 container create 830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, version=17.1.12, vendor=Red Hat, Inc., release=1761123044, com.redhat.component=openstack-horizon-container, build-date=2025-11-18T23:41:37Z, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, vcs-type=git, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, tcib_managed=true, url=https://www.redhat.com, architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.4, name=rhosp17/openstack-horizon, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d) Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.45 seconds Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/Apache::Vhost[cinder_wsgi]/Concat[10-cinder_wsgi.conf]/File[/etc/httpd/conf.d/10-cinder_wsgi.conf]/ensure: defined content as '{sha256}451f4a58f779cb244fb37b05e5698740e421f0f5f287bc8004572b650c678104' Jan 23 09:10:19 np0005593103 podman[64493]: 2026-01-23 09:10:19.111277453 +0000 UTC m=+0.079752969 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/content: content changed '{sha256}8afc9a0bcc462f08af54b6ac1cbfc3b8343b1feee00b4ab07d7a8c7b47065f0b' to '{sha256}a485bf07eb59abcc00cd6d0914ea7c4ab7c2a7f3c42cc561b4bfac27d32f2b43' Jan 23 09:10:19 np0005593103 puppet-user[63967]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/mode: mode changed '0644' to '0640' Jan 23 09:10:19 np0005593103 systemd[1]: Started libpod-conmon-830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d.scope. Jan 23 09:10:19 np0005593103 puppet-user[63250]: Notice: Applied catalog in 3.24 seconds Jan 23 09:10:19 np0005593103 puppet-user[63250]: Application: Jan 23 09:10:19 np0005593103 puppet-user[63250]: Initial environment: production Jan 23 09:10:19 np0005593103 puppet-user[63250]: Converged environment: production Jan 23 09:10:19 np0005593103 puppet-user[63250]: Run mode: user Jan 23 09:10:19 np0005593103 puppet-user[63250]: Changes: Jan 23 09:10:19 np0005593103 puppet-user[63250]: Total: 114 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Events: Jan 23 09:10:19 np0005593103 puppet-user[63250]: Success: 114 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Total: 114 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Resources: Jan 23 09:10:19 np0005593103 puppet-user[63250]: Changed: 114 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Out of sync: 114 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Skipped: 34 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Total: 372 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Time: Jan 23 09:10:19 np0005593103 puppet-user[63250]: Resources: 0.00 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Concat file: 0.00 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Anchor: 0.00 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Concat fragment: 0.00 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Cron: 0.02 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Package: 0.03 Jan 23 09:10:19 np0005593103 puppet-user[63250]: File: 0.12 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Augeas: 0.55 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Config retrieval: 1.78 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Last run: 1769159419 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Cinder config: 2.26 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Transaction evaluation: 3.23 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Catalog application: 3.24 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Total: 3.24 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Version: Jan 23 09:10:19 np0005593103 puppet-user[63250]: Config: 1769159414 Jan 23 09:10:19 np0005593103 puppet-user[63250]: Puppet: 7.10.0 Jan 23 09:10:19 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:19 np0005593103 podman[64475]: 2026-01-23 09:10:19.221192197 +0000 UTC m=+0.246195891 container init c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 heat-api, release=1761123044, distribution-scope=public, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-11-19T00:11:00Z, architecture=x86_64, vcs-type=git, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, name=rhosp17/openstack-heat-api, container_name=container-puppet-heat, managed_by=tripleo_ansible, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-container, version=17.1.12, url=https://www.redhat.com, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:19 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/36b9bf42aa04c58ddc07cf15ed60f9cc635b08c92685f072aa12bed3b315d37f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:19 np0005593103 podman[64475]: 2026-01-23 09:10:19.231016618 +0000 UTC m=+0.256020322 container start c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, config_id=tripleo_puppet_step1, tcib_managed=true, version=17.1.12, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-heat-api-container, summary=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-11-19T00:11:00Z, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, release=1761123044, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vcs-type=git, batch=17.1_20251118.1, name=rhosp17/openstack-heat-api) Jan 23 09:10:19 np0005593103 podman[64475]: 2026-01-23 09:10:19.231444089 +0000 UTC m=+0.256447783 container attach c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, tcib_managed=true, build-date=2025-11-19T00:11:00Z, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., vcs-type=git, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, architecture=x86_64, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, version=17.1.12, container_name=container-puppet-heat, io.buildah.version=1.41.4, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, distribution-scope=public, name=rhosp17/openstack-heat-api) Jan 23 09:10:19 np0005593103 puppet-user[63967]: Notice: Applied catalog in 0.24 seconds Jan 23 09:10:19 np0005593103 puppet-user[63967]: Application: Jan 23 09:10:19 np0005593103 puppet-user[63967]: Initial environment: production Jan 23 09:10:19 np0005593103 puppet-user[63967]: Converged environment: production Jan 23 09:10:19 np0005593103 puppet-user[63967]: Run mode: user Jan 23 09:10:19 np0005593103 puppet-user[63967]: Changes: Jan 23 09:10:19 np0005593103 puppet-user[63967]: Total: 2 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Events: Jan 23 09:10:19 np0005593103 puppet-user[63967]: Success: 2 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Total: 2 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Resources: Jan 23 09:10:19 np0005593103 puppet-user[63967]: Changed: 1 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Out of sync: 1 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Skipped: 12 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Total: 54 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Time: Jan 23 09:10:19 np0005593103 puppet-user[63967]: Concat file: 0.00 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Concat fragment: 0.00 Jan 23 09:10:19 np0005593103 puppet-user[63967]: File: 0.10 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Transaction evaluation: 0.23 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Catalog application: 0.24 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Config retrieval: 0.87 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Last run: 1769159419 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Total: 0.24 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Version: Jan 23 09:10:19 np0005593103 puppet-user[63967]: Config: 1769159418 Jan 23 09:10:19 np0005593103 puppet-user[63967]: Puppet: 7.10.0 Jan 23 09:10:19 np0005593103 podman[64493]: 2026-01-23 09:10:19.282373798 +0000 UTC m=+0.250849324 container init 830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, name=rhosp17/openstack-horizon, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, release=1761123044, config_id=tripleo_puppet_step1, version=17.1.12, io.openshift.expose-services=, url=https://www.redhat.com, container_name=container-puppet-horizon, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, build-date=2025-11-18T23:41:37Z, vcs-type=git, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-horizon-container, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:19 np0005593103 podman[64493]: 2026-01-23 09:10:19.291090651 +0000 UTC m=+0.259566167 container start 830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, build-date=2025-11-18T23:41:37Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, architecture=x86_64, name=rhosp17/openstack-horizon, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, url=https://www.redhat.com, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, vendor=Red Hat, Inc., tcib_managed=true, maintainer=OpenStack TripleO Team, container_name=container-puppet-horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 horizon, summary=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, version=17.1.12, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1) Jan 23 09:10:19 np0005593103 podman[64493]: 2026-01-23 09:10:19.291325228 +0000 UTC m=+0.259800784 container attach 830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, build-date=2025-11-18T23:41:37Z, batch=17.1_20251118.1, io.openshift.expose-services=, vcs-type=git, url=https://www.redhat.com, io.buildah.version=1.41.4, name=rhosp17/openstack-horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-horizon-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vendor=Red Hat, Inc., distribution-scope=public, container_name=container-puppet-horizon, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, release=1761123044) Jan 23 09:10:19 np0005593103 systemd[1]: var-lib-containers-storage-overlay-dc04c856c6a980cb1cbb1b0272166558c80807d7a3b36a1747e0d2fa4c9819d3-merged.mount: Deactivated successfully. Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[64067]: Warning: Scope(Apache::Vhost[heat_api_cfn_wsgi]): Jan 23 09:10:19 np0005593103 puppet-user[64067]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:19 np0005593103 puppet-user[64067]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:19 np0005593103 puppet-user[64067]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:19 np0005593103 puppet-user[64067]: file names. Jan 23 09:10:19 np0005593103 puppet-user[64067]: Jan 23 09:10:19 np0005593103 puppet-user[64067]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:19 np0005593103 puppet-user[64067]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:19 np0005593103 puppet-user[64067]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Jan 23 09:10:19 np0005593103 systemd[1]: libpod-14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53.scope: Deactivated successfully. Jan 23 09:10:19 np0005593103 systemd[1]: libpod-14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53.scope: Consumed 3.739s CPU time. Jan 23 09:10:19 np0005593103 podman[63872]: 2026-01-23 09:10:19.61068629 +0000 UTC m=+4.065952966 container died 14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, batch=17.1_20251118.1, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, config_id=tripleo_puppet_step1, url=https://www.redhat.com, build-date=2025-11-18T22:50:48Z, version=17.1.12, description=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., name=rhosp17/openstack-haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.expose-services=, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-haproxy-container, container_name=container-puppet-haproxy, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vcs-type=git) Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Api/Heat_config[heat_api/bind_host]/ensure: created Jan 23 09:10:19 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:19 np0005593103 systemd[1]: var-lib-containers-storage-overlay-51b8f9329546def44f0cee1dac003e5092ba7c2256cd0e8ed1156f32862c86db-merged.mount: Deactivated successfully. Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:19 np0005593103 puppet-user[64067]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.43 seconds Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:19 np0005593103 podman[64586]: 2026-01-23 09:10:19.781471947 +0000 UTC m=+0.158456300 container cleanup 14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53 (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, io.buildah.version=1.41.4, distribution-scope=public, name=rhosp17/openstack-haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:50:48Z, release=1761123044, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-haproxy, architecture=x86_64, vendor=Red Hat, Inc., com.redhat.component=openstack-haproxy-container, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:19 np0005593103 systemd[1]: libpod-conmon-14cc4cd0fcac4a9fa84e5fb1e7db5f4b9891f9b6c9861b3fa6fa644db380ae53.scope: Deactivated successfully. Jan 23 09:10:19 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-haproxy --conmon-pidfile /run/container-puppet-haproxy.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,haproxy_config --env NAME=haproxy --env STEP_CONFIG=include ::tripleo::packages#012exec {'wait-for-settle': command => '/bin/true' }#012class tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}#012['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::haproxy_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-haproxy --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-haproxy.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro --volume /etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro --volume /etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:19 np0005593103 systemd[1]: libpod-69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377.scope: Deactivated successfully. Jan 23 09:10:19 np0005593103 systemd[1]: libpod-69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377.scope: Consumed 7.298s CPU time. Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:19 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:20 np0005593103 podman[64654]: 2026-01-23 09:10:20.002747791 +0000 UTC m=+0.038212081 container died 69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, batch=17.1_20251118.1, architecture=x86_64, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:20:06Z, vcs-type=git, com.redhat.component=openstack-cinder-api-container, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.buildah.version=1.41.4, name=rhosp17/openstack-cinder-api, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, maintainer=OpenStack TripleO Team, container_name=container-puppet-cinder, summary=Red Hat OpenStack Platform 17.1 cinder-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, io.openshift.expose-services=, url=https://www.redhat.com, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, tcib_managed=true) Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Jan 23 09:10:20 np0005593103 podman[64654]: 2026-01-23 09:10:20.035051943 +0000 UTC m=+0.070516223 container cleanup 69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-cinder-api, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-cinder, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, url=https://www.redhat.com, batch=17.1_20251118.1, managed_by=tripleo_ansible, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-cinder-api-container, build-date=2025-11-19T00:20:06Z, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, release=1761123044, vcs-type=git, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_puppet_step1, distribution-scope=public, io.buildah.version=1.41.4) Jan 23 09:10:20 np0005593103 systemd[1]: libpod-conmon-69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377.scope: Deactivated successfully. Jan 23 09:10:20 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-cinder --conmon-pidfile /run/container-puppet-cinder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line --env NAME=cinder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::cinder::api#012include tripleo::profile::base::database::mysql::client#012#012include tripleo::profile::base::cinder::backup::swift#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::cinder::backup_bundle#012include tripleo::profile::base::cinder::scheduler#012#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::lvm#012include tripleo::profile::pacemaker::cinder::volume_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-cinder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-cinder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Jan 23 09:10:20 np0005593103 podman[64712]: 2026-01-23 09:10:20.239143329 +0000 UTC m=+0.082265476 container create 9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, vcs-type=git, batch=17.1_20251118.1, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-iscsid-container, container_name=container-puppet-iscsid, name=rhosp17/openstack-iscsid, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, version=17.1.12, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, build-date=2025-11-18T23:44:13Z, distribution-scope=public, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Api_cfn/Heat_config[heat_api_cfn/bind_host]/ensure: created Jan 23 09:10:20 np0005593103 systemd[1]: Started libpod-conmon-9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5.scope. Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:20 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:20 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1a210f0632c402a0683aacaa5c0c56dc4c85fa000c272d00dc580c991329fd1d/merged/tmp/iscsi.host supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:20 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1a210f0632c402a0683aacaa5c0c56dc4c85fa000c272d00dc580c991329fd1d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:20 np0005593103 podman[64712]: 2026-01-23 09:10:20.298095632 +0000 UTC m=+0.141217819 container init 9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.openshift.expose-services=, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-iscsid, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, version=17.1.12, build-date=2025-11-18T23:44:13Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 iscsid, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 iscsid, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.component=openstack-iscsid-container, io.buildah.version=1.41.4, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, tcib_managed=true, container_name=container-puppet-iscsid) Jan 23 09:10:20 np0005593103 podman[64712]: 2026-01-23 09:10:20.205742007 +0000 UTC m=+0.048864184 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Jan 23 09:10:20 np0005593103 podman[64712]: 2026-01-23 09:10:20.306129876 +0000 UTC m=+0.149252043 container start 9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, container_name=container-puppet-iscsid, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, com.redhat.component=openstack-iscsid-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, batch=17.1_20251118.1, distribution-scope=public, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-iscsid, build-date=2025-11-18T23:44:13Z, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, release=1761123044, description=Red Hat OpenStack Platform 17.1 iscsid, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, managed_by=tripleo_ansible) Jan 23 09:10:20 np0005593103 podman[64712]: 2026-01-23 09:10:20.306323111 +0000 UTC m=+0.149445278 container attach 9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, release=1761123044, version=17.1.12, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T23:44:13Z, io.buildah.version=1.41.4, batch=17.1_20251118.1, com.redhat.component=openstack-iscsid-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, name=rhosp17/openstack-iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-iscsid, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, distribution-scope=public, url=https://www.redhat.com, vendor=Red Hat, Inc., architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:20 np0005593103 systemd[1]: var-lib-containers-storage-overlay-a25d00c54aae7e71fab8f03828fde21cf78919652a465ad2a3ca5528a13cb8ac-merged.mount: Deactivated successfully. Jan 23 09:10:20 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-69f5b9b2b15fedc39a7319f39ba351a226d8ec08a5c553e61f3e719c5fdfc377-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Jan 23 09:10:20 np0005593103 podman[64793]: 2026-01-23 09:10:20.530331799 +0000 UTC m=+0.103348879 container create 94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, vendor=Red Hat, Inc., url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, config_id=tripleo_puppet_step1, io.openshift.expose-services=, tcib_managed=true, batch=17.1_20251118.1, com.redhat.component=openstack-keystone-container, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 keystone, name=rhosp17/openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, container_name=container-puppet-keystone, release=1761123044, io.buildah.version=1.41.4, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, build-date=2025-11-18T23:45:30Z, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team) Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:20 np0005593103 podman[64793]: 2026-01-23 09:10:20.476280297 +0000 UTC m=+0.049297357 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Jan 23 09:10:20 np0005593103 systemd[1]: Started libpod-conmon-94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec.scope. Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}80f0105d16abacbd0ab408ceffd5c52af00d296036bc67f7d7c18a3264f3ae63' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:20 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:20 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/fe08a4cb7889cb12a92f882306bcbd3ae6487078fd43d6884de292bb18477031/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:20 np0005593103 podman[64793]: 2026-01-23 09:10:20.616990761 +0000 UTC m=+0.190007831 container init 94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-keystone, architecture=x86_64, tcib_managed=true, io.openshift.expose-services=, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., name=rhosp17/openstack-keystone, build-date=2025-11-18T23:45:30Z, io.buildah.version=1.41.4, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, version=17.1.12, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-keystone-container, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:20 np0005593103 podman[64793]: 2026-01-23 09:10:20.623995788 +0000 UTC m=+0.197012838 container start 94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, distribution-scope=public, io.openshift.expose-services=, name=rhosp17/openstack-keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T23:45:30Z, version=17.1.12, vcs-type=git, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, com.redhat.component=openstack-keystone-container, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, container_name=container-puppet-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, release=1761123044, io.buildah.version=1.41.4, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d) Jan 23 09:10:20 np0005593103 podman[64793]: 2026-01-23 09:10:20.624383298 +0000 UTC m=+0.197400348 container attach 94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, distribution-scope=public, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, build-date=2025-11-18T23:45:30Z, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, com.redhat.component=openstack-keystone-container, description=Red Hat OpenStack Platform 17.1 keystone, version=17.1.12, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20251118.1, io.buildah.version=1.41.4, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, container_name=container-puppet-keystone, release=1761123044, name=rhosp17/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[heat_api_wsgi]/ensure: defined content as '{sha256}63c23a972f142aef4c001999d58b5cb122b43aa3aebf0785080bcc6e56385a66' Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/Apache::Vhost[heat_api_wsgi]/Concat[10-heat_api_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_wsgi.conf]/ensure: defined content as '{sha256}d0284301a28107fee6f2a78ac983991c9ef20577688dee026406bf01b715e8fa' Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[63965]: Notice: Applied catalog in 1.37 seconds Jan 23 09:10:20 np0005593103 puppet-user[63965]: Application: Jan 23 09:10:20 np0005593103 puppet-user[63965]: Initial environment: production Jan 23 09:10:20 np0005593103 puppet-user[63965]: Converged environment: production Jan 23 09:10:20 np0005593103 puppet-user[63965]: Run mode: user Jan 23 09:10:20 np0005593103 puppet-user[63965]: Changes: Jan 23 09:10:20 np0005593103 puppet-user[63965]: Total: 89 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Events: Jan 23 09:10:20 np0005593103 puppet-user[63965]: Success: 89 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Total: 89 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Resources: Jan 23 09:10:20 np0005593103 puppet-user[63965]: Skipped: 31 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Changed: 89 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Out of sync: 89 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Total: 331 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Time: Jan 23 09:10:20 np0005593103 puppet-user[63965]: Anchor: 0.00 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Concat file: 0.00 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Concat fragment: 0.00 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Cron: 0.01 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Package: 0.03 Jan 23 09:10:20 np0005593103 puppet-user[63965]: File: 0.21 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Heat config: 0.83 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Transaction evaluation: 1.36 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Catalog application: 1.37 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Config retrieval: 1.69 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Last run: 1769159420 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Resources: 0.00 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Total: 1.37 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Version: Jan 23 09:10:20 np0005593103 puppet-user[63965]: Config: 1769159417 Jan 23 09:10:20 np0005593103 puppet-user[63965]: Puppet: 7.10.0 Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Jan 23 09:10:20 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}9b060a0cb9074472babd05cae42250e7198d0a7e81b08e78f7dd9183459496e1' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:21 np0005593103 ovs-vsctl[64851]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[heat_api_cfn_wsgi]/ensure: defined content as '{sha256}00dfd79a2e891b11ddd21cb5ce9d8c56f440a274b42eb9e7e9616c7c7e326582' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/Apache::Vhost[heat_api_cfn_wsgi]/Concat[10-heat_api_cfn_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_cfn_wsgi.conf]/ensure: defined content as '{sha256}9b05cba3a86fe1a00c2543b917d66a2cb773f3f5f90443879ccb4a49f21667ff' Jan 23 09:10:21 np0005593103 puppet-user[64067]: Notice: Applied catalog in 1.28 seconds Jan 23 09:10:21 np0005593103 puppet-user[64067]: Application: Jan 23 09:10:21 np0005593103 puppet-user[64067]: Initial environment: production Jan 23 09:10:21 np0005593103 puppet-user[64067]: Converged environment: production Jan 23 09:10:21 np0005593103 puppet-user[64067]: Run mode: user Jan 23 09:10:21 np0005593103 puppet-user[64067]: Changes: Jan 23 09:10:21 np0005593103 puppet-user[64067]: Total: 90 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Events: Jan 23 09:10:21 np0005593103 puppet-user[64067]: Success: 90 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Total: 90 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Resources: Jan 23 09:10:21 np0005593103 puppet-user[64067]: Skipped: 32 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Changed: 90 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Out of sync: 90 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Total: 333 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Time: Jan 23 09:10:21 np0005593103 puppet-user[64067]: Concat file: 0.00 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Anchor: 0.00 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Concat fragment: 0.00 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Cron: 0.01 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Package: 0.02 Jan 23 09:10:21 np0005593103 puppet-user[64067]: File: 0.12 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Heat config: 0.78 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Transaction evaluation: 1.26 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Catalog application: 1.28 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Config retrieval: 1.66 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Last run: 1769159421 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Resources: 0.00 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Total: 1.28 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Version: Jan 23 09:10:21 np0005593103 puppet-user[64067]: Config: 1769159418 Jan 23 09:10:21 np0005593103 puppet-user[64067]: Puppet: 7.10.0 Jan 23 09:10:21 np0005593103 puppet-user[64529]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:21 np0005593103 puppet-user[64529]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:21 np0005593103 puppet-user[64529]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:21 np0005593103 puppet-user[64529]: (file & line not available) Jan 23 09:10:21 np0005593103 puppet-user[64529]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:21 np0005593103 puppet-user[64529]: (file & line not available) Jan 23 09:10:21 np0005593103 puppet-user[64548]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:21 np0005593103 puppet-user[64548]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:21 np0005593103 puppet-user[64548]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:21 np0005593103 puppet-user[64548]: (file & line not available) Jan 23 09:10:21 np0005593103 puppet-user[64548]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:21 np0005593103 puppet-user[64548]: (file & line not available) Jan 23 09:10:21 np0005593103 systemd[1]: libpod-ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364.scope: Deactivated successfully. Jan 23 09:10:21 np0005593103 systemd[1]: libpod-ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364.scope: Consumed 5.416s CPU time. Jan 23 09:10:21 np0005593103 podman[65001]: 2026-01-23 09:10:21.468302597 +0000 UTC m=+0.029715464 container died ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, url=https://www.redhat.com, version=17.1.12, distribution-scope=public, release=1761123044, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, tcib_managed=true, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-type=git, batch=17.1_20251118.1, vendor=Red Hat, Inc., architecture=x86_64, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-11-19T00:11:00Z, container_name=container-puppet-heat_api, managed_by=tripleo_ansible, name=rhosp17/openstack-heat-api, com.redhat.component=openstack-heat-api-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:21 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:21 np0005593103 systemd[1]: var-lib-containers-storage-overlay-3ffb220a9c202d2c9d99a8efa6f9a7f4ef3407da3329c5696d0778de6dc9967d-merged.mount: Deactivated successfully. Jan 23 09:10:21 np0005593103 puppet-user[64529]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:21 np0005593103 puppet-user[64529]: removed in a future realse. Use heat::db::database_connection instead Jan 23 09:10:21 np0005593103 podman[65001]: 2026-01-23 09:10:21.53810789 +0000 UTC m=+0.099520757 container cleanup ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-heat-api-container, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp17/openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:11:00Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, io.buildah.version=1.41.4, url=https://www.redhat.com, tcib_managed=true, io.openshift.expose-services=, container_name=container-puppet-heat_api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api) Jan 23 09:10:21 np0005593103 systemd[1]: libpod-conmon-ce44e9163cc66f12d01bfd9f6effc6884d6f921890fee4ea44b2a502779c3364.scope: Deactivated successfully. Jan 23 09:10:21 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api --conmon-pidfile /run/container-puppet-heat_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini --env NAME=heat_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 09:10:21 np0005593103 puppet-user[64548]: Warning: This parameter is deprecated, please use `internal_proxy`. at ["/etc/puppet/modules/apache/manifests/mod/remoteip.pp", 77]:["/etc/puppet/modules/tripleo/manifests/profile/base/horizon.pp", 103] Jan 23 09:10:21 np0005593103 puppet-user[64548]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Jan 23 09:10:21 np0005593103 podman[65093]: 2026-01-23 09:10:21.9068847 +0000 UTC m=+0.073089241 container create a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, version=17.1.12, vendor=Red Hat, Inc., com.redhat.component=openstack-manila-api-container, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, architecture=x86_64, name=rhosp17/openstack-manila-api, maintainer=OpenStack TripleO Team, container_name=container-puppet-manila, io.openshift.expose-services=, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, build-date=2025-11-19T00:21:10Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351) Jan 23 09:10:21 np0005593103 systemd[1]: libpod-ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8.scope: Deactivated successfully. Jan 23 09:10:21 np0005593103 systemd[1]: libpod-ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8.scope: Consumed 5.324s CPU time. Jan 23 09:10:21 np0005593103 podman[64031]: 2026-01-23 09:10:21.931719093 +0000 UTC m=+5.830369756 container died ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, tcib_managed=true, version=17.1.12, batch=17.1_20251118.1, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, release=1761123044, build-date=2025-11-19T00:10:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.buildah.version=1.41.4, container_name=container-puppet-heat_api_cfn, config_id=tripleo_puppet_step1, architecture=x86_64, io.openshift.expose-services=, com.redhat.component=openstack-heat-api-cfn-container, vendor=Red Hat, Inc.) Jan 23 09:10:21 np0005593103 systemd[1]: Started libpod-conmon-a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb.scope. Jan 23 09:10:21 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:21 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e2d86512cc5d4d83166ff9bad4e3dd65ab3792a631caeb014dbd42fd3b2727c2/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:21 np0005593103 podman[65093]: 2026-01-23 09:10:21.963265924 +0000 UTC m=+0.129470455 container init a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, vendor=Red Hat, Inc., build-date=2025-11-19T00:21:10Z, container_name=container-puppet-manila, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-manila-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, maintainer=OpenStack TripleO Team, version=17.1.12, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, vcs-type=git, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, managed_by=tripleo_ansible, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp17/openstack-manila-api, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4) Jan 23 09:10:21 np0005593103 podman[65093]: 2026-01-23 09:10:21.871421304 +0000 UTC m=+0.037625825 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Jan 23 09:10:21 np0005593103 podman[65093]: 2026-01-23 09:10:21.968893264 +0000 UTC m=+0.135097785 container start a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, batch=17.1_20251118.1, vendor=Red Hat, Inc., build-date=2025-11-19T00:21:10Z, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-manila-api-container, managed_by=tripleo_ansible, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, distribution-scope=public, architecture=x86_64, version=17.1.12, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, container_name=container-puppet-manila, name=rhosp17/openstack-manila-api, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, url=https://www.redhat.com) Jan 23 09:10:21 np0005593103 podman[65093]: 2026-01-23 09:10:21.969069319 +0000 UTC m=+0.135273840 container attach a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, com.redhat.component=openstack-manila-api-container, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, maintainer=OpenStack TripleO Team, container_name=container-puppet-manila, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-type=git, io.buildah.version=1.41.4, build-date=2025-11-19T00:21:10Z, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp17/openstack-manila-api, distribution-scope=public, batch=17.1_20251118.1, architecture=x86_64, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api) Jan 23 09:10:22 np0005593103 podman[65117]: 2026-01-23 09:10:22.033363835 +0000 UTC m=+0.090424624 container cleanup ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, release=1761123044, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-cfn-container, url=https://www.redhat.com, build-date=2025-11-19T00:10:53Z, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.12, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, config_id=tripleo_puppet_step1, container_name=container-puppet-heat_api_cfn, io.buildah.version=1.41.4, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, name=rhosp17/openstack-heat-api-cfn, batch=17.1_20251118.1) Jan 23 09:10:22 np0005593103 systemd[1]: libpod-conmon-ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8.scope: Deactivated successfully. Jan 23 09:10:22 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api_cfn --conmon-pidfile /run/container-puppet-heat_api_cfn.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat_api_cfn --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api_cfn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api_cfn --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api_cfn.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.82 seconds Jan 23 09:10:22 np0005593103 puppet-user[64548]: Warning: Scope(Apache::Vhost[horizon_vhost]): Jan 23 09:10:22 np0005593103 puppet-user[64548]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:22 np0005593103 puppet-user[64548]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:22 np0005593103 puppet-user[64548]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:22 np0005593103 puppet-user[64548]: file names. Jan 23 09:10:22 np0005593103 puppet-user[64548]: Jan 23 09:10:22 np0005593103 puppet-user[64548]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:22 np0005593103 puppet-user[64548]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:22 np0005593103 puppet-user[64548]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:22 np0005593103 puppet-user[64548]: Warning: Scope(Apache::Vhost[horizon_ssl_vhost]): Jan 23 09:10:22 np0005593103 puppet-user[64548]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:22 np0005593103 puppet-user[64548]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:22 np0005593103 puppet-user[64548]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:22 np0005593103 puppet-user[64548]: file names. Jan 23 09:10:22 np0005593103 puppet-user[64548]: Jan 23 09:10:22 np0005593103 puppet-user[64548]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:22 np0005593103 puppet-user[64548]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:22 np0005593103 puppet-user[64548]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:22 np0005593103 puppet-user[64778]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:22 np0005593103 puppet-user[64778]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:22 np0005593103 puppet-user[64778]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:22 np0005593103 puppet-user[64778]: (file & line not available) Jan 23 09:10:22 np0005593103 puppet-user[64778]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:22 np0005593103 puppet-user[64778]: (file & line not available) Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.96 seconds Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64778]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.11 seconds Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64778]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[reset-iscsi-initiator-name]/returns: executed successfully Jan 23 09:10:22 np0005593103 puppet-user[64778]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/File[/etc/iscsi/.initiator_reset]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64778]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[sync-iqn-to-host]/returns: executed successfully Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/auth_encryption_key]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_metadata_server_url]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_waitcondition_server_url]/ensure: created Jan 23 09:10:22 np0005593103 systemd[1]: var-lib-containers-storage-overlay-462dbf549efe6fbeb15f94b0b9778709160f16b7122493f4211d3d8d31778eed-merged.mount: Deactivated successfully. Jan 23 09:10:22 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-ea4a48982c8d719f9d0b96c8cc44383d23a03bb5da735ae047aeb513ea60f5f8-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Remoteip/File[remoteip.conf]/ensure: defined content as '{sha256}9c8d4355af8c0547dc87c380e06a19f272a0bd3fac83afce5f8eb116cf574c2e' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon/File[/etc/openstack-dashboard/local_settings.d]/mode: mode changed '0750' to '0755' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon]/mode: mode changed '0750' to '0751' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon/horizon.log]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/trusts_delegated_roles]/ensure: created Jan 23 09:10:22 np0005593103 podman[65273]: 2026-01-23 09:10:22.475921434 +0000 UTC m=+0.091761719 container create 44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, version=17.1.12, io.buildah.version=1.41.4, com.redhat.component=openstack-memcached-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:49Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, url=https://www.redhat.com, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-memcached, vendor=Red Hat, Inc., managed_by=tripleo_ansible, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, container_name=container-puppet-memcached) Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}4af87ae775a58e76b8f50924dd91469a2c2507a5e9d29b1985570cd73ba32587' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_resources_per_stack]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/num_engine_workers]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/convergence_engine]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/reauthentication_auth_method]/ensure: created Jan 23 09:10:22 np0005593103 systemd[1]: Started libpod-conmon-44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649.scope. Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:22 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_nested_stack_depth]/ensure: created Jan 23 09:10:22 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/10b9b8a1dee11bbb46ab8860edb2beda587ba08b16fd8eb2e974181c0beda156/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:22 np0005593103 podman[65273]: 2026-01-23 09:10:22.419446607 +0000 UTC m=+0.035286892 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/client_retry_limit]/ensure: created Jan 23 09:10:22 np0005593103 podman[65273]: 2026-01-23 09:10:22.525562879 +0000 UTC m=+0.141403154 container init 44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-memcached, release=1761123044, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., architecture=x86_64, version=17.1.12, io.openshift.expose-services=, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, container_name=container-puppet-memcached, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-memcached-container, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached) Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:22 np0005593103 podman[65273]: 2026-01-23 09:10:22.535746071 +0000 UTC m=+0.151586346 container start 44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=container-puppet-memcached, name=rhosp17/openstack-memcached, maintainer=OpenStack TripleO Team, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, url=https://www.redhat.com, io.buildah.version=1.41.4, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, summary=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, architecture=x86_64, batch=17.1_20251118.1) Jan 23 09:10:22 np0005593103 podman[65273]: 2026-01-23 09:10:22.536255954 +0000 UTC m=+0.152096249 container attach 44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, name=rhosp17/openstack-memcached, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:49Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.component=openstack-memcached-container, release=1761123044, maintainer=OpenStack TripleO Team, distribution-scope=public, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.4, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, container_name=container-puppet-memcached, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached) Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Remoteip/Apache::Mod[remoteip]/File[remoteip.load]/ensure: defined content as '{sha256}3977211787f6c6bf5629e4156b32d1dc95c37bc640452d0027b2bc9b1ec9f2d7' Jan 23 09:10:22 np0005593103 puppet-user[64831]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:22 np0005593103 puppet-user[64831]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:22 np0005593103 puppet-user[64831]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:22 np0005593103 puppet-user[64831]: (file & line not available) Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon/Concat[/etc/openstack-dashboard/local_settings]/File[/etc/openstack-dashboard/local_settings]/content: content changed '{sha256}bb0e13a0afbf37de0b90c300eea7d75d3db826936a1effc1acf58205f154b6f2' to '{sha256}da7acbb40ab05f71335d492fa8acec9c547546daaac1458b6f079011b750f19b' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/etc/httpd/conf.d/openstack-dashboard.conf]/content: content changed '{sha256}2674ec0a2b4f3412930e918216e5698d5bc877be4364105136866cad3f2ae4bb' to '{sha256}5c3c01834d94a99528a118d4a02978297ac0bf0250e0729c7e4bbd47d4865680' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Alias/File[alias.conf]/ensure: defined content as '{sha256}8c17a7de4a27d92b2aca6b156dca9e26b9e0bf31b8cc43f63c971aeed09d4e54' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon::Dashboards::Heat/Concat[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/File[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/ensure: defined content as '{sha256}dd44da5c856beb5e53df88fc72180a79669b73c9c04d487b5033290279692113' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/content: content changed '{sha256}30de7bbf440460cde78da0e2cf1cab2404921ef0b0e926f5ebaaf973dc4252c5' to '{sha256}838e0d57b7536ffc538afd2e4d916f26ccb29380c13563d0f1ef51d676112c34' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/group: group changed 'root' to 'apache' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/mode: mode changed '0644' to '0640' Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache::Mod::Alias/Apache::Mod[alias]/File[alias.load]/ensure: defined content as '{sha256}824016275330b45fd8bd04b07792de5f9aaa337f8272bfc01c5b57bb515fc9b4' Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_vhost]/Concat[10-horizon_vhost.conf]/File[/etc/httpd/conf.d/10-horizon_vhost.conf]/ensure: defined content as '{sha256}ff3058f08dd48a69ef767afb37336aff4b68cd5ea96da7db75cc02b26eb6c978' Jan 23 09:10:22 np0005593103 puppet-user[64831]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:22 np0005593103 puppet-user[64831]: (file & line not available) Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64778]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Augeas[chap_algs in /etc/iscsi/iscsid.conf]/returns: executed successfully Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_ssl_vhost]/Concat[15-horizon_ssl_vhost.conf]/File[/etc/httpd/conf.d/15-horizon_ssl_vhost.conf]/ensure: defined content as '{sha256}06f5ffb8de48665fe999e96f2deac8a43d79ed981f94254b5486ece7e3655733' Jan 23 09:10:22 np0005593103 puppet-user[64778]: Notice: Applied catalog in 0.47 seconds Jan 23 09:10:22 np0005593103 puppet-user[64548]: Notice: Applied catalog in 0.42 seconds Jan 23 09:10:22 np0005593103 puppet-user[64778]: Application: Jan 23 09:10:22 np0005593103 puppet-user[64778]: Initial environment: production Jan 23 09:10:22 np0005593103 puppet-user[64778]: Converged environment: production Jan 23 09:10:22 np0005593103 puppet-user[64778]: Run mode: user Jan 23 09:10:22 np0005593103 puppet-user[64778]: Changes: Jan 23 09:10:22 np0005593103 puppet-user[64778]: Total: 4 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Events: Jan 23 09:10:22 np0005593103 puppet-user[64778]: Success: 4 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Total: 4 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Resources: Jan 23 09:10:22 np0005593103 puppet-user[64778]: Changed: 4 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Out of sync: 4 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Skipped: 8 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Total: 13 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Time: Jan 23 09:10:22 np0005593103 puppet-user[64778]: File: 0.00 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Exec: 0.06 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Config retrieval: 0.14 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Augeas: 0.38 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Transaction evaluation: 0.46 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Catalog application: 0.47 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Application: Jan 23 09:10:22 np0005593103 puppet-user[64778]: Last run: 1769159422 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Initial environment: production Jan 23 09:10:22 np0005593103 puppet-user[64548]: Converged environment: production Jan 23 09:10:22 np0005593103 puppet-user[64548]: Run mode: user Jan 23 09:10:22 np0005593103 puppet-user[64548]: Changes: Jan 23 09:10:22 np0005593103 puppet-user[64548]: Total: 50 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Events: Jan 23 09:10:22 np0005593103 puppet-user[64548]: Success: 50 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Total: 50 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Resources: Jan 23 09:10:22 np0005593103 puppet-user[64548]: Skipped: 33 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Changed: 48 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Out of sync: 48 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Total: 140 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Time: Jan 23 09:10:22 np0005593103 puppet-user[64548]: Concat file: 0.00 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Concat fragment: 0.00 Jan 23 09:10:22 np0005593103 puppet-user[64548]: File: 0.23 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Transaction evaluation: 0.41 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Catalog application: 0.42 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Config retrieval: 1.06 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Last run: 1769159422 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Total: 0.42 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Version: Jan 23 09:10:22 np0005593103 puppet-user[64548]: Config: 1769159421 Jan 23 09:10:22 np0005593103 puppet-user[64548]: Puppet: 7.10.0 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Total: 0.47 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Version: Jan 23 09:10:22 np0005593103 puppet-user[64778]: Config: 1769159422 Jan 23 09:10:22 np0005593103 puppet-user[64778]: Puppet: 7.10.0 Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:22 np0005593103 puppet-user[64831]: Notice: Accepting previously invalid value for target type 'Enum['sql', 'template']' Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64831]: Warning: Scope(Class[Keystone]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:23 np0005593103 puppet-user[64831]: removed in a future realse. Use keystone::db::database_connection instead Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Jan 23 09:10:23 np0005593103 systemd[1]: libpod-9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5.scope: Deactivated successfully. Jan 23 09:10:23 np0005593103 systemd[1]: libpod-9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5.scope: Consumed 2.681s CPU time. Jan 23 09:10:23 np0005593103 podman[64712]: 2026-01-23 09:10:23.070600013 +0000 UTC m=+2.913722180 container died 9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, version=17.1.12, description=Red Hat OpenStack Platform 17.1 iscsid, container_name=container-puppet-iscsid, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64, com.redhat.component=openstack-iscsid-container, build-date=2025-11-18T23:44:13Z, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-iscsid, io.openshift.expose-services=, vcs-type=git, batch=17.1_20251118.1, distribution-scope=public, vendor=Red Hat, Inc., tcib_managed=true, managed_by=tripleo_ansible, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Jan 23 09:10:23 np0005593103 podman[65412]: 2026-01-23 09:10:23.216458044 +0000 UTC m=+0.127289269 container cleanup 9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, name=rhosp17/openstack-iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, architecture=x86_64, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, container_name=container-puppet-iscsid, build-date=2025-11-18T23:44:13Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-iscsid-container, summary=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20251118.1, url=https://www.redhat.com, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, release=1761123044, io.openshift.expose-services=) Jan 23 09:10:23 np0005593103 systemd[1]: libpod-conmon-9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5.scope: Deactivated successfully. Jan 23 09:10:23 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-iscsid --conmon-pidfile /run/container-puppet-iscsid.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,iscsid_config --env NAME=iscsid --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::iscsid#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-iscsid --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-iscsid.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/iscsi:/tmp/iscsi.host:z --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Jan 23 09:10:23 np0005593103 systemd[1]: libpod-830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d.scope: Deactivated successfully. Jan 23 09:10:23 np0005593103 systemd[1]: libpod-830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d.scope: Consumed 3.719s CPU time. Jan 23 09:10:23 np0005593103 podman[64493]: 2026-01-23 09:10:23.322058402 +0000 UTC m=+4.290533958 container died 830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, com.redhat.component=openstack-horizon-container, description=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, vcs-type=git, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, url=https://www.redhat.com, build-date=2025-11-18T23:41:37Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, name=rhosp17/openstack-horizon, maintainer=OpenStack TripleO Team, container_name=container-puppet-horizon) Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:23 np0005593103 puppet-user[64529]: Notice: Applied catalog in 1.21 seconds Jan 23 09:10:23 np0005593103 puppet-user[64529]: Application: Jan 23 09:10:23 np0005593103 puppet-user[64529]: Initial environment: production Jan 23 09:10:23 np0005593103 puppet-user[64529]: Converged environment: production Jan 23 09:10:23 np0005593103 puppet-user[64529]: Run mode: user Jan 23 09:10:23 np0005593103 puppet-user[64529]: Changes: Jan 23 09:10:23 np0005593103 puppet-user[64529]: Total: 61 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Events: Jan 23 09:10:23 np0005593103 puppet-user[64529]: Success: 61 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Total: 61 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Resources: Jan 23 09:10:23 np0005593103 puppet-user[64529]: Skipped: 21 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Changed: 61 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Out of sync: 61 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Total: 259 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Time: Jan 23 09:10:23 np0005593103 puppet-user[64529]: Anchor: 0.00 Jan 23 09:10:23 np0005593103 puppet-user[64529]: File: 0.00 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Cron: 0.01 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Augeas: 0.02 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Package: 0.03 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Config retrieval: 0.93 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Heat config: 1.01 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Transaction evaluation: 1.20 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Catalog application: 1.21 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Last run: 1769159423 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Resources: 0.00 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Total: 1.21 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Version: Jan 23 09:10:23 np0005593103 puppet-user[64529]: Config: 1769159421 Jan 23 09:10:23 np0005593103 puppet-user[64529]: Puppet: 7.10.0 Jan 23 09:10:23 np0005593103 systemd[1]: var-lib-containers-storage-overlay-1a210f0632c402a0683aacaa5c0c56dc4c85fa000c272d00dc580c991329fd1d-merged.mount: Deactivated successfully. Jan 23 09:10:23 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9bf4e2f5d78a434f1fa584d23cd927f3330f17264c84d17f4406bced8e1c11f5-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:23 np0005593103 systemd[1]: var-lib-containers-storage-overlay-36b9bf42aa04c58ddc07cf15ed60f9cc635b08c92685f072aa12bed3b315d37f-merged.mount: Deactivated successfully. Jan 23 09:10:23 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:23 np0005593103 podman[65468]: 2026-01-23 09:10:23.401340278 +0000 UTC m=+0.071375926 container cleanup 830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, tcib_managed=true, container_name=container-puppet-horizon, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.component=openstack-horizon-container, name=rhosp17/openstack-horizon, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, version=17.1.12, description=Red Hat OpenStack Platform 17.1 horizon, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, managed_by=tripleo_ansible, architecture=x86_64, vcs-type=git, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T23:41:37Z, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:23 np0005593103 systemd[1]: libpod-conmon-830b1534e6ff6f4a39a0ccfd22cdf9598929c5a93065b9cfbc72d2916451674d.scope: Deactivated successfully. Jan 23 09:10:23 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-horizon --conmon-pidfile /run/container-puppet-horizon.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,horizon_config --env NAME=horizon --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::horizon#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-horizon --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-horizon.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Jan 23 09:10:23 np0005593103 podman[65535]: 2026-01-23 09:10:23.622728335 +0000 UTC m=+0.069838504 container create 7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-qdrouterd-container, release=1761123044, io.buildah.version=1.41.4, vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.openshift.expose-services=, vendor=Red Hat, Inc., container_name=container-puppet-metrics_qdr, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, build-date=2025-11-18T22:49:46Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd) Jan 23 09:10:23 np0005593103 systemd[1]: Started libpod-conmon-7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66.scope. Jan 23 09:10:23 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:23 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/78f9002b4f3ad97b6f66a0b0a21b70244cb68e2e7b215bc93aec6e3d60c75876/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:23 np0005593103 podman[65535]: 2026-01-23 09:10:23.67537432 +0000 UTC m=+0.122484509 container init 7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, container_name=container-puppet-metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-11-18T22:49:46Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_puppet_step1, version=17.1.12, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, distribution-scope=public, tcib_managed=true, managed_by=tripleo_ansible, url=https://www.redhat.com, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git) Jan 23 09:10:23 np0005593103 podman[65535]: 2026-01-23 09:10:23.584123955 +0000 UTC m=+0.031234144 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:10:23 np0005593103 podman[65535]: 2026-01-23 09:10:23.693051602 +0000 UTC m=+0.140161771 container start 7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, name=rhosp17/openstack-qdrouterd, version=17.1.12, distribution-scope=public, maintainer=OpenStack TripleO Team, build-date=2025-11-18T22:49:46Z, tcib_managed=true, com.redhat.component=openstack-qdrouterd-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., io.buildah.version=1.41.4, vcs-type=git, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=container-puppet-metrics_qdr, batch=17.1_20251118.1, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Jan 23 09:10:23 np0005593103 podman[65535]: 2026-01-23 09:10:23.693287578 +0000 UTC m=+0.140397787 container attach 7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, vendor=Red Hat, Inc., architecture=x86_64, name=rhosp17/openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-metrics_qdr, io.openshift.expose-services=, build-date=2025-11-18T22:49:46Z, managed_by=tripleo_ansible, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, com.redhat.component=openstack-qdrouterd-container, release=1761123044, io.buildah.version=1.41.4, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, batch=17.1_20251118.1, url=https://www.redhat.com) Jan 23 09:10:23 np0005593103 podman[65604]: 2026-01-23 09:10:23.804541347 +0000 UTC m=+0.062221392 container create cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, tcib_managed=true, build-date=2025-11-18T22:51:13Z, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-mariadb-container, vcs-type=git, vendor=Red Hat, Inc., org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-mysql, io.openshift.expose-services=, config_id=tripleo_puppet_step1, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, distribution-scope=public, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:23 np0005593103 puppet-user[64831]: Warning: Scope(Apache::Vhost[keystone_wsgi]): Jan 23 09:10:23 np0005593103 puppet-user[64831]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:23 np0005593103 puppet-user[64831]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:23 np0005593103 puppet-user[64831]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:23 np0005593103 puppet-user[64831]: file names. Jan 23 09:10:23 np0005593103 puppet-user[64831]: Jan 23 09:10:23 np0005593103 puppet-user[64831]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:23 np0005593103 puppet-user[64831]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:23 np0005593103 puppet-user[64831]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:23 np0005593103 systemd[1]: Started libpod-conmon-cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442.scope. Jan 23 09:10:23 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:23 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/bfa109634ec760af2612eeef9ddbdfd4e93689d574f0e80c8a153f53f4d5481d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:23 np0005593103 podman[65604]: 2026-01-23 09:10:23.848254903 +0000 UTC m=+0.105934958 container init cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, io.openshift.expose-services=, version=17.1.12, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, build-date=2025-11-18T22:51:13Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=container-puppet-mysql, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, architecture=x86_64, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, release=1761123044, config_id=tripleo_puppet_step1) Jan 23 09:10:23 np0005593103 podman[65604]: 2026-01-23 09:10:23.854483029 +0000 UTC m=+0.112163074 container start cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, build-date=2025-11-18T22:51:13Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, release=1761123044, config_id=tripleo_puppet_step1, architecture=x86_64, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-mysql, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb) Jan 23 09:10:23 np0005593103 podman[65604]: 2026-01-23 09:10:23.85524776 +0000 UTC m=+0.112927835 container attach cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-mysql, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, tcib_managed=true, release=1761123044, config_id=tripleo_puppet_step1, vcs-type=git, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, com.redhat.component=openstack-mariadb-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, distribution-scope=public, build-date=2025-11-18T22:51:13Z, name=rhosp17/openstack-mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64) Jan 23 09:10:23 np0005593103 podman[65604]: 2026-01-23 09:10:23.775579293 +0000 UTC m=+0.033259358 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:23 np0005593103 systemd[1]: libpod-c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc.scope: Deactivated successfully. Jan 23 09:10:23 np0005593103 systemd[1]: libpod-c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc.scope: Consumed 4.419s CPU time. Jan 23 09:10:23 np0005593103 podman[64475]: 2026-01-23 09:10:23.892711439 +0000 UTC m=+4.917715143 container died c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, container_name=container-puppet-heat, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, maintainer=OpenStack TripleO Team, build-date=2025-11-19T00:11:00Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, summary=Red Hat OpenStack Platform 17.1 heat-api, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, name=rhosp17/openstack-heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:23 np0005593103 puppet-user[64831]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.36 seconds Jan 23 09:10:23 np0005593103 podman[65681]: 2026-01-23 09:10:23.97071 +0000 UTC m=+0.066757742 container cleanup c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, distribution-scope=public, release=1761123044, tcib_managed=true, vendor=Red Hat, Inc., name=rhosp17/openstack-heat-api, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, version=17.1.12, build-date=2025-11-19T00:11:00Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, url=https://www.redhat.com, container_name=container-puppet-heat, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, architecture=x86_64) Jan 23 09:10:23 np0005593103 puppet-user[65152]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:23 np0005593103 puppet-user[65152]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:23 np0005593103 puppet-user[65152]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:23 np0005593103 puppet-user[65152]: (file & line not available) Jan 23 09:10:23 np0005593103 systemd[1]: libpod-conmon-c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc.scope: Deactivated successfully. Jan 23 09:10:23 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat --conmon-pidfile /run/container-puppet-heat.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::engine#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:24 np0005593103 puppet-user[65152]: (file & line not available) Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Scope(Class[Manila]): The sql_connection parameter is deprecated and will be \ Jan 23 09:10:24 np0005593103 puppet-user[65152]: removed in a future realse. Use manila::db::database_connection instead Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[token/expiration]/ensure: created Jan 23 09:10:24 np0005593103 podman[65796]: 2026-01-23 09:10:24.312306555 +0000 UTC m=+0.047867758 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/enable]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/certfile]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/keyfile]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_certs]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_key]/ensure: created Jan 23 09:10:24 np0005593103 podman[65796]: 2026-01-23 09:10:24.381578694 +0000 UTC m=+0.117139847 container create ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, name=rhosp17/openstack-neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, version=17.1.12, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., batch=17.1_20251118.1, build-date=2025-11-19T00:23:27Z, io.buildah.version=1.41.4, release=1761123044, managed_by=tripleo_ansible, distribution-scope=public, com.redhat.component=openstack-neutron-server-container, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, container_name=container-puppet-neutron, vcs-type=git) Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/cert_subject]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/driver]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/template_file]/ensure: created Jan 23 09:10:24 np0005593103 systemd[1]: tmp-crun.nS4lQM.mount: Deactivated successfully. Jan 23 09:10:24 np0005593103 systemd[1]: var-lib-containers-storage-overlay-508d031f6ed17bf7e5b2fe70fa150229833af8001ef650456fd976995cffe826-merged.mount: Deactivated successfully. Jan 23 09:10:24 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-c5048d3e412ffc5df6d1a28771c0b1e0f7dd27d29e36d7f5208efa155ccb5efc-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[token/provider]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[DEFAULT/notification_format]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/0]/ensure: defined content as '{sha256}56869bd921cd6e48bfb60c3f9e3a55cae893a9be0916a32e07f8176dde8e30e9' Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/1]/ensure: defined content as '{sha256}bbac5aade02e6c8ae19886b0dd73b354c8c3022ab9d452c92e6672ad6da36fe4' Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/0]/ensure: defined content as '{sha256}b115f7eadd52c7f62cb88f529c8ba2d2a484ffdaf31a8a7267ea430b8dd54392' Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/1]/ensure: defined content as '{sha256}3f993a1373164915a04455a2b9b0f837407e59fa05cb35b5fc923690f52b0982' Jan 23 09:10:24 np0005593103 systemd[1]: Started libpod-conmon-ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a.scope. Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/key_repository]/ensure: created Jan 23 09:10:24 np0005593103 systemd[1]: tmp-crun.XXMgv5.mount: Deactivated successfully. Jan 23 09:10:24 np0005593103 puppet-user[65365]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:24 np0005593103 puppet-user[65365]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:24 np0005593103 puppet-user[65365]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:24 np0005593103 puppet-user[65365]: (file & line not available) Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[token/revoke_by_id]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/max_active_keys]/ensure: created Jan 23 09:10:24 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:24 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34459ad1f7fa4fc20518a582eb6daa59ded88797f6d8f9ef56bae4eb481c78b5/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Keystone_config[credential/key_repository]/ensure: created Jan 23 09:10:24 np0005593103 podman[65796]: 2026-01-23 09:10:24.460159191 +0000 UTC m=+0.195720344 container init ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, url=https://www.redhat.com, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-neutron, version=17.1.12, description=Red Hat OpenStack Platform 17.1 neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, build-date=2025-11-19T00:23:27Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, distribution-scope=public, com.redhat.component=openstack-neutron-server-container, architecture=x86_64, vendor=Red Hat, Inc., managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, io.openshift.expose-services=, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-neutron-server, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:24 np0005593103 podman[65796]: 2026-01-23 09:10:24.465985426 +0000 UTC m=+0.201546579 container start ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-neutron, architecture=x86_64, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, version=17.1.12, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:23:27Z, vcs-type=git, release=1761123044, io.buildah.version=1.41.4, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 neutron-server, distribution-scope=public, tcib_managed=true, vendor=Red Hat, Inc., name=rhosp17/openstack-neutron-server) Jan 23 09:10:24 np0005593103 podman[65796]: 2026-01-23 09:10:24.46613272 +0000 UTC m=+0.201693873 container attach ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, container_name=container-puppet-neutron, version=17.1.12, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, batch=17.1_20251118.1, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-19T00:23:27Z, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-neutron-server, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., release=1761123044, tcib_managed=true, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 neutron-server) Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:24 np0005593103 puppet-user[65365]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:24 np0005593103 puppet-user[65365]: (file & line not available) Jan 23 09:10:24 np0005593103 puppet-user[65365]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.09 seconds Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Cron::Trust_flush/Cron[keystone-manage trust_flush]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[65365]: Notice: /Stage[main]/Memcached/File[/etc/sysconfig/memcached]/content: content changed '{sha256}31f7d20fad86bdd2bc5692619928af8785dc0e9f858863aeece67cff0e4edfd2' to '{sha256}4997424c856782ebd2e73d4d63ee2d4fc83e97cecd24b356dd217fc580b2788d' Jan 23 09:10:24 np0005593103 puppet-user[65365]: Notice: Applied catalog in 0.01 seconds Jan 23 09:10:24 np0005593103 puppet-user[65365]: Application: Jan 23 09:10:24 np0005593103 puppet-user[65365]: Initial environment: production Jan 23 09:10:24 np0005593103 puppet-user[65365]: Converged environment: production Jan 23 09:10:24 np0005593103 puppet-user[65365]: Run mode: user Jan 23 09:10:24 np0005593103 puppet-user[65365]: Changes: Jan 23 09:10:24 np0005593103 puppet-user[65365]: Total: 1 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Events: Jan 23 09:10:24 np0005593103 puppet-user[65365]: Success: 1 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Total: 1 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Resources: Jan 23 09:10:24 np0005593103 puppet-user[65365]: Changed: 1 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Out of sync: 1 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Skipped: 9 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Total: 10 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Time: Jan 23 09:10:24 np0005593103 puppet-user[65365]: File: 0.01 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Transaction evaluation: 0.01 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Catalog application: 0.01 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Config retrieval: 0.12 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Last run: 1769159424 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Total: 0.01 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Version: Jan 23 09:10:24 np0005593103 puppet-user[65365]: Config: 1769159424 Jan 23 09:10:24 np0005593103 puppet-user[65365]: Puppet: 7.10.0 Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend_argument]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/enabled]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/memcache_servers]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/tls_enabled]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/debug]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Policy/Oslo::Policy[keystone_config]/Keystone_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/connection]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/max_retries]/ensure: created Jan 23 09:10:24 np0005593103 systemd[1]: libpod-44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649.scope: Deactivated successfully. Jan 23 09:10:24 np0005593103 systemd[1]: libpod-44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649.scope: Consumed 2.204s CPU time. Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/db_max_retries]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Oslo::Middleware[keystone_config]/Keystone_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Default[keystone_config]/Keystone_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/topics]/ensure: created Jan 23 09:10:24 np0005593103 podman[65923]: 2026-01-23 09:10:24.929848863 +0000 UTC m=+0.054415192 container died 44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, version=17.1.12, com.redhat.component=openstack-memcached-container, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-memcached, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:49Z, distribution-scope=public, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/manila/manifests/share.pp, line: 50, column: 18) Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Unknown variable: 'manila_generic_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 292, column: 48) Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Unknown variable: 'manila_netapp_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 294, column: 39) Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Unknown variable: 'manila_vmax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 295, column: 39) Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Unknown variable: 'manila_powermax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 296, column: 39) Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Unknown variable: 'manila_isilon_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 297, column: 39) Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Unknown variable: 'manila_unity_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 298, column: 39) Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Unknown variable: 'manila_vnx_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 299, column: 39) Jan 23 09:10:24 np0005593103 puppet-user[65152]: Warning: Unknown variable: 'manila_flashblade_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 300, column: 39) Jan 23 09:10:24 np0005593103 podman[65923]: 2026-01-23 09:10:24.977574137 +0000 UTC m=+0.102140436 container cleanup 44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 memcached, name=rhosp17/openstack-memcached, version=17.1.12, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_puppet_step1, release=1761123044, container_name=container-puppet-memcached, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, io.openshift.expose-services=, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git) Jan 23 09:10:24 np0005593103 systemd[1]: libpod-conmon-44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649.scope: Deactivated successfully. Jan 23 09:10:24 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-memcached --conmon-pidfile /run/container-puppet-memcached.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=memcached --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::memcached#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-memcached --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-memcached.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}53dfa0d41d027ee4ada678fc8cff712d592eb56677fe52adaa1f3a2e42fd9f60' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[/var/www/cgi-bin/keystone]/group: group changed 'root' to 'keystone' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[keystone_wsgi]/ensure: defined content as '{sha256}55e95baab868583f1b6646e2dcc61edb7f403991f97d4397478e9a9dd3e7d1f2' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_mellon.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_openidc.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_gssapi.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_mellon.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_openidc.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/Apache::Vhost[keystone_wsgi]/Concat[10-keystone_wsgi.conf]/File[/etc/httpd/conf.d/10-keystone_wsgi.conf]/ensure: defined content as '{sha256}8fcc9880f830cf33f84657996176a4295bc72a4bca876dd425d109e856e3f121' Jan 23 09:10:25 np0005593103 puppet-user[64831]: Notice: Applied catalog in 1.11 seconds Jan 23 09:10:25 np0005593103 puppet-user[64831]: Application: Jan 23 09:10:25 np0005593103 puppet-user[64831]: Initial environment: production Jan 23 09:10:25 np0005593103 puppet-user[64831]: Converged environment: production Jan 23 09:10:25 np0005593103 puppet-user[64831]: Run mode: user Jan 23 09:10:25 np0005593103 puppet-user[64831]: Changes: Jan 23 09:10:25 np0005593103 puppet-user[64831]: Total: 88 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Events: Jan 23 09:10:25 np0005593103 puppet-user[64831]: Success: 88 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Total: 88 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Resources: Jan 23 09:10:25 np0005593103 puppet-user[64831]: Skipped: 31 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Changed: 88 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Out of sync: 88 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Total: 279 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Time: Jan 23 09:10:25 np0005593103 puppet-user[64831]: Concat file: 0.00 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Concat fragment: 0.00 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Cron: 0.01 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Augeas: 0.02 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Package: 0.04 Jan 23 09:10:25 np0005593103 puppet-user[64831]: File: 0.12 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Keystone config: 0.66 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Transaction evaluation: 1.08 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Catalog application: 1.11 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Config retrieval: 1.57 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Last run: 1769159425 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Resources: 0.00 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Total: 1.11 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Version: Jan 23 09:10:25 np0005593103 puppet-user[64831]: Config: 1769159422 Jan 23 09:10:25 np0005593103 puppet-user[64831]: Puppet: 7.10.0 Jan 23 09:10:25 np0005593103 puppet-user[65152]: Warning: Scope(Apache::Vhost[manila_wsgi]): Jan 23 09:10:25 np0005593103 puppet-user[65152]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:25 np0005593103 puppet-user[65152]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:25 np0005593103 puppet-user[65152]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:25 np0005593103 puppet-user[65152]: file names. Jan 23 09:10:25 np0005593103 puppet-user[65152]: Jan 23 09:10:25 np0005593103 puppet-user[65152]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:25 np0005593103 puppet-user[65152]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:25 np0005593103 puppet-user[65152]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:25 np0005593103 systemd[1]: var-lib-containers-storage-overlay-10b9b8a1dee11bbb46ab8860edb2beda587ba08b16fd8eb2e974181c0beda156-merged.mount: Deactivated successfully. Jan 23 09:10:25 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-44263bbb47583f3f269ba8d3a8c22e0531fc9b92451e3577505263bc250ec649-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.48 seconds Jan 23 09:10:25 np0005593103 podman[65993]: 2026-01-23 09:10:25.492124407 +0000 UTC m=+0.080442718 container create 3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, distribution-scope=public, container_name=container-puppet-nova, release=1761123044, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp17/openstack-nova-api, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:34:57Z, io.buildah.version=1.41.4, managed_by=tripleo_ansible, url=https://www.redhat.com, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, vcs-type=git) Jan 23 09:10:25 np0005593103 systemd[1]: Started libpod-conmon-3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11.scope. Jan 23 09:10:25 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:25 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b3b24ac5a4eb5986bb73bd8d7f5bc4ca0ef32115edcdf663effe697e879be2c0/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:25 np0005593103 podman[65993]: 2026-01-23 09:10:25.446917431 +0000 UTC m=+0.035235742 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 09:10:25 np0005593103 podman[65993]: 2026-01-23 09:10:25.552445337 +0000 UTC m=+0.140763648 container init 3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-api-container, version=17.1.12, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, batch=17.1_20251118.1, release=1761123044, summary=Red Hat OpenStack Platform 17.1 nova-api, build-date=2025-11-19T00:34:57Z, vcs-type=git, name=rhosp17/openstack-nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, container_name=container-puppet-nova, io.buildah.version=1.41.4) Jan 23 09:10:25 np0005593103 podman[65993]: 2026-01-23 09:10:25.559446854 +0000 UTC m=+0.147765165 container start 3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, build-date=2025-11-19T00:34:57Z, batch=17.1_20251118.1, name=rhosp17/openstack-nova-api, config_id=tripleo_puppet_step1, vcs-type=git, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, io.buildah.version=1.41.4, com.redhat.component=openstack-nova-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, container_name=container-puppet-nova, managed_by=tripleo_ansible, url=https://www.redhat.com) Jan 23 09:10:25 np0005593103 podman[65993]: 2026-01-23 09:10:25.559825324 +0000 UTC m=+0.148143655 container attach 3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, url=https://www.redhat.com, name=rhosp17/openstack-nova-api, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, com.redhat.component=openstack-nova-api-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, container_name=container-puppet-nova, build-date=2025-11-19T00:34:57Z, version=17.1.12, description=Red Hat OpenStack Platform 17.1 nova-api) Jan 23 09:10:25 np0005593103 puppet-user[65619]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:25 np0005593103 puppet-user[65619]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:25 np0005593103 puppet-user[65619]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:25 np0005593103 puppet-user[65619]: (file & line not available) Jan 23 09:10:25 np0005593103 puppet-user[65619]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:25 np0005593103 puppet-user[65619]: (file & line not available) Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: Accepting previously invalid value for target type 'Integer' Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.14 seconds Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/owner: owner changed 'qdrouterd' to 'root' Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/group: group changed 'qdrouterd' to 'root' Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/mode: mode changed '0700' to '0755' Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: /Stage[main]/Qdr::Config/File[/etc/qpid-dispatch/ssl]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: /Stage[main]/Qdr::Config/File[qdrouterd.conf]/content: content changed '{sha256}89e10d8896247f992c5f0baf027c25a8ca5d0441be46d8859d9db2067ea74cd3' to '{sha256}4343f5a98f5ccbf9842bc7a4b8bf46a0aebf7fcdb47e59aa0997c49e7c9ccc71' Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd/metrics_qdr.log]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65619]: Notice: Applied catalog in 0.03 seconds Jan 23 09:10:25 np0005593103 puppet-user[65619]: Application: Jan 23 09:10:25 np0005593103 puppet-user[65619]: Initial environment: production Jan 23 09:10:25 np0005593103 puppet-user[65619]: Converged environment: production Jan 23 09:10:25 np0005593103 puppet-user[65619]: Run mode: user Jan 23 09:10:25 np0005593103 puppet-user[65619]: Changes: Jan 23 09:10:25 np0005593103 puppet-user[65619]: Total: 7 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Events: Jan 23 09:10:25 np0005593103 puppet-user[65619]: Success: 7 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Total: 7 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Resources: Jan 23 09:10:25 np0005593103 puppet-user[65619]: Skipped: 13 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Changed: 5 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Out of sync: 5 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Total: 20 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Time: Jan 23 09:10:25 np0005593103 puppet-user[65619]: File: 0.01 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Transaction evaluation: 0.03 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Catalog application: 0.03 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Config retrieval: 0.17 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Last run: 1769159425 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Total: 0.03 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Version: Jan 23 09:10:25 np0005593103 puppet-user[65619]: Config: 1769159425 Jan 23 09:10:25 np0005593103 puppet-user[65619]: Puppet: 7.10.0 Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/api_paste_config]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/storage_availability_zone]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/rootwrap_config]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/state_path]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/host]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_listen]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/enabled_share_protocols]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/default_share_type]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_workers]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/auth_strategy]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Cron::Db_purge/Cron[manila-manage db purge]/ensure: created Jan 23 09:10:25 np0005593103 systemd[1]: libpod-94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec.scope: Deactivated successfully. Jan 23 09:10:25 np0005593103 systemd[1]: libpod-94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec.scope: Consumed 4.917s CPU time. Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_url]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_type]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/region_name]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/username]/ensure: created Jan 23 09:10:25 np0005593103 podman[66144]: 2026-01-23 09:10:25.986852449 +0000 UTC m=+0.055773380 container died 94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, config_id=tripleo_puppet_step1, architecture=x86_64, com.redhat.component=openstack-keystone-container, io.openshift.expose-services=, name=rhosp17/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., distribution-scope=public, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, container_name=container-puppet-keystone, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, build-date=2025-11-18T23:45:30Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, tcib_managed=true, io.buildah.version=1.41.4, version=17.1.12) Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/user_domain_name]/ensure: created Jan 23 09:10:25 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/password]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_name]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_domain_name]/ensure: created Jan 23 09:10:26 np0005593103 systemd[1]: libpod-7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66.scope: Deactivated successfully. Jan 23 09:10:26 np0005593103 systemd[1]: libpod-7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66.scope: Consumed 2.202s CPU time. Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_api_class]/ensure: created Jan 23 09:10:26 np0005593103 podman[65535]: 2026-01-23 09:10:26.083854696 +0000 UTC m=+2.530964915 container died 7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=container-puppet-metrics_qdr, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., io.openshift.expose-services=, url=https://www.redhat.com, version=17.1.12, tcib_managed=true, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, architecture=x86_64, vcs-type=git, build-date=2025-11-18T22:49:46Z, com.redhat.component=openstack-qdrouterd-container, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_url]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_type]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/region_name]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/username]/ensure: created Jan 23 09:10:26 np0005593103 podman[66144]: 2026-01-23 09:10:26.138989228 +0000 UTC m=+0.207910189 container cleanup 94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, maintainer=OpenStack TripleO Team, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-keystone-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, url=https://www.redhat.com, config_id=tripleo_puppet_step1, distribution-scope=public, container_name=container-puppet-keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, name=rhosp17/openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, io.openshift.expose-services=, tcib_managed=true, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T23:45:30Z) Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/user_domain_name]/ensure: created Jan 23 09:10:26 np0005593103 systemd[1]: libpod-conmon-94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec.scope: Deactivated successfully. Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/password]/ensure: created Jan 23 09:10:26 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-keystone --conmon-pidfile /run/container-puppet-keystone.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config --env NAME=keystone --env STEP_CONFIG=include ::tripleo::packages#012['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::keystone#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-keystone --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-keystone.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_name]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_domain_name]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv4_enabled]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv6_enabled]/ensure: created Jan 23 09:10:26 np0005593103 podman[66201]: 2026-01-23 09:10:26.185146889 +0000 UTC m=+0.087150376 container cleanup 7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1, com.redhat.component=openstack-qdrouterd-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, release=1761123044, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.buildah.version=1.41.4, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:46Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Backends/Manila_config[DEFAULT/enabled_share_backends]/ensure: created Jan 23 09:10:26 np0005593103 systemd[1]: libpod-conmon-7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66.scope: Deactivated successfully. Jan 23 09:10:26 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-metrics_qdr --conmon-pidfile /run/container-puppet-metrics_qdr.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=metrics_qdr --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::qdr#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-metrics_qdr --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-metrics_qdr.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/connection]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65678]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:26 np0005593103 puppet-user[65678]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:26 np0005593103 puppet-user[65678]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:26 np0005593103 puppet-user[65678]: (file & line not available) Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/max_retries]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/db_max_retries]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65880]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Jan 23 09:10:26 np0005593103 ovs-vsctl[66328]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:26 np0005593103 puppet-user[65678]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:26 np0005593103 puppet-user[65678]: (file & line not available) Jan 23 09:10:26 np0005593103 systemd[1]: var-lib-containers-storage-overlay-78f9002b4f3ad97b6f66a0b0a21b70244cb68e2e7b215bc93aec6e3d60c75876-merged.mount: Deactivated successfully. Jan 23 09:10:26 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-7789a507c009074c27d577af39a43986b18e87092de3ecafb6370b2565101f66-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:26 np0005593103 systemd[1]: var-lib-containers-storage-overlay-fe08a4cb7889cb12a92f882306bcbd3ae6487078fd43d6884de292bb18477031-merged.mount: Deactivated successfully. Jan 23 09:10:26 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-94f41668e87e8ecac6df1f6e0b5447d62b7d56d6555c494557734fd4211b8aec-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Rabbit[manila_config]/Manila_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65880]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:26 np0005593103 puppet-user[65880]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:26 np0005593103 puppet-user[65880]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:26 np0005593103 puppet-user[65880]: (file & line not available) Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/server_request_prefix]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/broadcast_prefix]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/group_request_prefix]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65880]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:26 np0005593103 puppet-user[65880]: (file & line not available) Jan 23 09:10:26 np0005593103 puppet-user[65880]: Warning: Unknown variable: 'dhcp_agents_per_net'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/neutron.pp, line: 154, column: 37) Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/container_name]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65678]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.36 seconds Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/idle_timeout]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/trace]/ensure: created Jan 23 09:10:26 np0005593103 podman[66440]: 2026-01-23 09:10:26.616554201 +0000 UTC m=+0.086849269 container create 566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, batch=17.1_20251118.1, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:32Z, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, release=1761123044, architecture=x86_64, vcs-type=git, url=https://www.redhat.com, com.redhat.component=openstack-cron-container, description=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, container_name=container-puppet-crond) Jan 23 09:10:26 np0005593103 podman[66449]: 2026-01-23 09:10:26.651411001 +0000 UTC m=+0.105683211 container create 4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, release=1761123044, summary=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp17/openstack-nova-api, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_id=tripleo_puppet_step1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, batch=17.1_20251118.1, tcib_managed=true, build-date=2025-11-19T00:34:57Z, vendor=Red Hat, Inc., io.buildah.version=1.41.4, io.openshift.expose-services=, container_name=container-puppet-nova_metadata, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible) Jan 23 09:10:26 np0005593103 systemd[1]: Started libpod-conmon-566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09.scope. Jan 23 09:10:26 np0005593103 podman[66440]: 2026-01-23 09:10:26.564916213 +0000 UTC m=+0.035211301 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Jan 23 09:10:26 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:26 np0005593103 systemd[1]: Started libpod-conmon-4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f.scope. Jan 23 09:10:26 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/da14c1744c512d62b2a12ea62a5b7599d08525a06bb2dc0dd21d2b7f32901ad8/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:26 np0005593103 puppet-user[65678]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/root/.my.cnf]/ensure: defined content as '{sha256}ab7ac237761d7e85dafbf4f0aa46c359eec1ec3cc1f030b535c5c2333da75d88' Jan 23 09:10:26 np0005593103 podman[66440]: 2026-01-23 09:10:26.685547632 +0000 UTC m=+0.155842740 container init 566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 cron, release=1761123044, name=rhosp17/openstack-cron, vendor=Red Hat, Inc., io.buildah.version=1.41.4, build-date=2025-11-18T22:49:32Z, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, version=17.1.12, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, container_name=container-puppet-crond, com.redhat.component=openstack-cron-container, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cron, config_id=tripleo_puppet_step1) Jan 23 09:10:26 np0005593103 puppet-user[65678]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}652447b18c6612302e29c44741c052299a6b2fefbb8c1076666ac91a56a935bb' Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65678]: Notice: /Stage[main]/Mysql::Server::Config/File[mysql-config-file]/content: content changed '{sha256}df7b18b99470a82afb1aebff284d910b04ceb628c9ac89d8e2fe9fb4682d5fc9' to '{sha256}608104bbc83042ebf5c6dfe0441f2c6ee2146def5e8466a70db08d5f7f75b638' Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/control_exchange]/ensure: created Jan 23 09:10:26 np0005593103 podman[66440]: 2026-01-23 09:10:26.694410778 +0000 UTC m=+0.164705866 container start 566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, container_name=container-puppet-crond, version=17.1.12, com.redhat.component=openstack-cron-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 cron, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cron, architecture=x86_64, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, name=rhosp17/openstack-cron, build-date=2025-11-18T22:49:32Z, io.openshift.expose-services=, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron) Jan 23 09:10:26 np0005593103 podman[66440]: 2026-01-23 09:10:26.694702666 +0000 UTC m=+0.164997794 container attach 566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, maintainer=OpenStack TripleO Team, vcs-type=git, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, release=1761123044, architecture=x86_64, build-date=2025-11-18T22:49:32Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-cron-container, distribution-scope=public, name=rhosp17/openstack-cron, config_id=tripleo_puppet_step1, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 cron, container_name=container-puppet-crond, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 cron) Jan 23 09:10:26 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:26 np0005593103 puppet-user[65678]: Notice: /Stage[main]/Mysql::Server::Installdb/File[/var/log/mariadb/mariadb.log]/ensure: created Jan 23 09:10:26 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/bcd01971c066377bd41ab375df337b36185a8263609f61520edf9f0754229985/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:26 np0005593103 podman[66449]: 2026-01-23 09:10:26.709613695 +0000 UTC m=+0.163885895 container init 4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, tcib_managed=true, version=17.1.12, managed_by=tripleo_ansible, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-nova-api-container, url=https://www.redhat.com, container_name=container-puppet-nova_metadata, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-nova-api, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:34:57Z, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, release=1761123044) Jan 23 09:10:26 np0005593103 podman[66449]: 2026-01-23 09:10:26.610695454 +0000 UTC m=+0.064967684 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Notice: Applied catalog in 0.07 seconds Jan 23 09:10:26 np0005593103 puppet-user[65678]: Application: Jan 23 09:10:26 np0005593103 puppet-user[65678]: Initial environment: production Jan 23 09:10:26 np0005593103 puppet-user[65678]: Converged environment: production Jan 23 09:10:26 np0005593103 puppet-user[65678]: Run mode: user Jan 23 09:10:26 np0005593103 puppet-user[65678]: Changes: Jan 23 09:10:26 np0005593103 puppet-user[65678]: Total: 4 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Events: Jan 23 09:10:26 np0005593103 puppet-user[65678]: Success: 4 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Total: 4 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Resources: Jan 23 09:10:26 np0005593103 puppet-user[65678]: Skipped: 13 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Changed: 4 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Out of sync: 4 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Total: 18 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Time: Jan 23 09:10:26 np0005593103 puppet-user[65678]: File: 0.02 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Transaction evaluation: 0.06 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Catalog application: 0.07 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Config retrieval: 0.42 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Last run: 1769159426 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Total: 0.07 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Version: Jan 23 09:10:26 np0005593103 puppet-user[65678]: Config: 1769159426 Jan 23 09:10:26 np0005593103 puppet-user[65678]: Puppet: 7.10.0 Jan 23 09:10:26 np0005593103 podman[66449]: 2026-01-23 09:10:26.717072903 +0000 UTC m=+0.171345103 container start 4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, maintainer=OpenStack TripleO Team, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-nova-api-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, build-date=2025-11-19T00:34:57Z, vendor=Red Hat, Inc., tcib_managed=true, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, container_name=container-puppet-nova_metadata, batch=17.1_20251118.1, name=rhosp17/openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, release=1761123044, io.openshift.expose-services=) Jan 23 09:10:26 np0005593103 podman[66449]: 2026-01-23 09:10:26.717269858 +0000 UTC m=+0.171542048 container attach 4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, vcs-type=git, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, name=rhosp17/openstack-nova-api, com.redhat.component=openstack-nova-api-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, maintainer=OpenStack TripleO Team, container_name=container-puppet-nova_metadata, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, config_id=tripleo_puppet_step1, tcib_managed=true, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, managed_by=tripleo_ansible, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.12, build-date=2025-11-19T00:34:57Z, description=Red Hat OpenStack Platform 17.1 nova-api, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.4, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila/Oslo::Concurrency[manila_config]/Manila_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/debug]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:26 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}42b2b3e1254096a3c28e781e5fcac0be11fcca2a0d1dc1ddb2773c358318ea37' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:27 np0005593103 systemd[1]: libpod-cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442.scope: Deactivated successfully. Jan 23 09:10:27 np0005593103 systemd[1]: libpod-cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442.scope: Consumed 3.088s CPU time. Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Policy/Oslo::Policy[manila_config]/Manila_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Api/Oslo::Middleware[manila_config]/Manila_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:27 np0005593103 podman[66539]: 2026-01-23 09:10:27.151782842 +0000 UTC m=+0.060167996 container died cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, config_id=tripleo_puppet_step1, com.redhat.component=openstack-mariadb-container, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, name=rhosp17/openstack-mariadb, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, release=1761123044, batch=17.1_20251118.1, build-date=2025-11-18T22:51:13Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, container_name=container-puppet-mysql, maintainer=OpenStack TripleO Team, tcib_managed=true, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, vcs-type=git) Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[/var/www/cgi-bin/manila]/group: group changed 'root' to 'manila' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[manila_wsgi]/ensure: defined content as '{sha256}ca07199ace8325d094e754ccdfefb2b5a78a13cd657d68221b3a68b53b0dd893' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/driver_handles_share_servers]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_backend_name]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_driver]/ensure: created Jan 23 09:10:27 np0005593103 podman[66539]: 2026-01-23 09:10:27.20375729 +0000 UTC m=+0.112142434 container cleanup cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, container_name=container-puppet-mysql, com.redhat.component=openstack-mariadb-container, architecture=x86_64, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, url=https://www.redhat.com, tcib_managed=true, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible, distribution-scope=public, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb) Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_conf_path]/ensure: created Jan 23 09:10:27 np0005593103 systemd[1]: libpod-conmon-cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442.scope: Deactivated successfully. Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_auth_id]/ensure: created Jan 23 09:10:27 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-mysql --conmon-pidfile /run/container-puppet-mysql.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=mysql --env STEP_CONFIG=include ::tripleo::packages#012['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }#012exec {'wait-for-settle': command => '/bin/true' }#012include tripleo::profile::pacemaker::database::mysql_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-mysql --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-mysql.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_cluster_name]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_ip]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_is_remote]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_volume_mode]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_protocol_helper_type]/ensure: created Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/Apache::Vhost[manila_wsgi]/Concat[10-manila_wsgi.conf]/File[/etc/httpd/conf.d/10-manila_wsgi.conf]/ensure: defined content as '{sha256}1e78f60dfd5a5a1baa162ace948ef5cf00839451255dd92acb2018266329e609' Jan 23 09:10:27 np0005593103 ovs-vsctl[66579]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:27 np0005593103 puppet-user[65152]: Notice: Applied catalog in 1.70 seconds Jan 23 09:10:27 np0005593103 puppet-user[65152]: Application: Jan 23 09:10:27 np0005593103 puppet-user[65152]: Initial environment: production Jan 23 09:10:27 np0005593103 puppet-user[65152]: Converged environment: production Jan 23 09:10:27 np0005593103 puppet-user[65152]: Run mode: user Jan 23 09:10:27 np0005593103 puppet-user[65152]: Changes: Jan 23 09:10:27 np0005593103 puppet-user[65152]: Total: 115 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Events: Jan 23 09:10:27 np0005593103 puppet-user[65152]: Success: 115 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Total: 115 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Resources: Jan 23 09:10:27 np0005593103 puppet-user[65152]: Changed: 115 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Out of sync: 115 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Skipped: 47 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Total: 330 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Time: Jan 23 09:10:27 np0005593103 puppet-user[65152]: Resources: 0.00 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Concat file: 0.00 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Concat fragment: 0.00 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Augeas: 0.02 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Cron: 0.02 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Package: 0.04 Jan 23 09:10:27 np0005593103 puppet-user[65152]: File: 0.11 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Manila config: 1.26 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Config retrieval: 1.68 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Transaction evaluation: 1.68 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Catalog application: 1.70 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Last run: 1769159427 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Total: 1.70 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Version: Jan 23 09:10:27 np0005593103 puppet-user[65152]: Config: 1769159423 Jan 23 09:10:27 np0005593103 puppet-user[65152]: Puppet: 7.10.0 Jan 23 09:10:27 np0005593103 systemd[1]: var-lib-containers-storage-overlay-bfa109634ec760af2612eeef9ddbdfd4e93689d574f0e80c8a153f53f4d5481d-merged.mount: Deactivated successfully. Jan 23 09:10:27 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-cd5ed906b6e859afa30198e8c21788293a9b2fd3e3a4a40afd3330013c730442-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:27 np0005593103 puppet-user[66086]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:27 np0005593103 puppet-user[66086]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:27 np0005593103 puppet-user[66086]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:27 np0005593103 puppet-user[66086]: (file & line not available) Jan 23 09:10:27 np0005593103 puppet-user[66086]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:27 np0005593103 puppet-user[66086]: (file & line not available) Jan 23 09:10:27 np0005593103 podman[66673]: 2026-01-23 09:10:27.634082933 +0000 UTC m=+0.093792955 container create 2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, description=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2025-11-18T23:34:05Z, com.redhat.component=openstack-ovn-controller-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, url=https://www.redhat.com, io.buildah.version=1.41.4, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, managed_by=tripleo_ansible, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, maintainer=OpenStack TripleO Team, tcib_managed=true, architecture=x86_64, container_name=container-puppet-ovn_controller, name=rhosp17/openstack-ovn-controller, release=1761123044) Jan 23 09:10:27 np0005593103 systemd[1]: Started libpod-conmon-2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b.scope. Jan 23 09:10:27 np0005593103 podman[66673]: 2026-01-23 09:10:27.586204565 +0000 UTC m=+0.045914617 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Jan 23 09:10:27 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:27 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e79b09920cc5b23070198d9343d3b3c4406065eb0399e0d8cdb5c546174809b9/merged/etc/sysconfig/modules supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:27 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e79b09920cc5b23070198d9343d3b3c4406065eb0399e0d8cdb5c546174809b9/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:27 np0005593103 podman[66673]: 2026-01-23 09:10:27.709927356 +0000 UTC m=+0.169637408 container init 2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, io.openshift.expose-services=, com.redhat.component=openstack-ovn-controller-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ovn-controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, container_name=container-puppet-ovn_controller, build-date=2025-11-18T23:34:05Z, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, vcs-type=git, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.12, name=rhosp17/openstack-ovn-controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, release=1761123044, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272) Jan 23 09:10:27 np0005593103 podman[66673]: 2026-01-23 09:10:27.717143878 +0000 UTC m=+0.176853900 container start 2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, url=https://www.redhat.com, io.buildah.version=1.41.4, io.openshift.expose-services=, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, architecture=x86_64, release=1761123044, build-date=2025-11-18T23:34:05Z, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-ovn_controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-ovn-controller, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, vendor=Red Hat, Inc., com.redhat.component=openstack-ovn-controller-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ovn-controller) Jan 23 09:10:27 np0005593103 podman[66673]: 2026-01-23 09:10:27.717481807 +0000 UTC m=+0.177191829 container attach 2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, container_name=container-puppet-ovn_controller, release=1761123044, batch=17.1_20251118.1, distribution-scope=public, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, version=17.1.12, name=rhosp17/openstack-ovn-controller, build-date=2025-11-18T23:34:05Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, com.redhat.component=openstack-ovn-controller-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git) Jan 23 09:10:27 np0005593103 puppet-user[66086]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Jan 23 09:10:27 np0005593103 puppet-user[66086]: in a future release. Use nova::cinder::os_region_name instead Jan 23 09:10:27 np0005593103 puppet-user[66086]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Jan 23 09:10:27 np0005593103 puppet-user[66086]: in a future release. Use nova::cinder::catalog_info instead Jan 23 09:10:27 np0005593103 puppet-user[66086]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:27 np0005593103 puppet-user[66086]: removed in a future realse. Use nova::db::database_connection instead Jan 23 09:10:27 np0005593103 puppet-user[66086]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Jan 23 09:10:27 np0005593103 puppet-user[66086]: removed in a future realse. Use nova::db::api_database_connection instead Jan 23 09:10:27 np0005593103 puppet-user[66086]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Jan 23 09:10:28 np0005593103 systemd[1]: libpod-a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb.scope: Deactivated successfully. Jan 23 09:10:28 np0005593103 systemd[1]: libpod-a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb.scope: Consumed 5.628s CPU time. Jan 23 09:10:28 np0005593103 podman[65093]: 2026-01-23 09:10:28.05000074 +0000 UTC m=+6.216205271 container died a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-type=git, tcib_managed=true, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-19T00:21:10Z, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-manila, version=17.1.12, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-manila-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, batch=17.1_20251118.1, managed_by=tripleo_ansible, name=rhosp17/openstack-manila-api) Jan 23 09:10:28 np0005593103 podman[66745]: 2026-01-23 09:10:28.133576521 +0000 UTC m=+0.076255756 container cleanup a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, com.redhat.component=openstack-manila-api-container, tcib_managed=true, container_name=container-puppet-manila, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, build-date=2025-11-19T00:21:10Z, url=https://www.redhat.com, vcs-type=git, name=rhosp17/openstack-manila-api, release=1761123044, description=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, architecture=x86_64, maintainer=OpenStack TripleO Team) Jan 23 09:10:28 np0005593103 systemd[1]: libpod-conmon-a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb.scope: Deactivated successfully. Jan 23 09:10:28 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-manila --conmon-pidfile /run/container-puppet-manila.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line --env NAME=manila --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::manila::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::manila::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::manila::share_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-manila --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-manila.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Jan 23 09:10:28 np0005593103 puppet-user[65880]: Warning: Scope(Apache::Vhost[neutron-api-proxy]): Jan 23 09:10:28 np0005593103 puppet-user[65880]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:28 np0005593103 puppet-user[65880]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:28 np0005593103 puppet-user[65880]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:28 np0005593103 puppet-user[65880]: file names. Jan 23 09:10:28 np0005593103 puppet-user[65880]: Jan 23 09:10:28 np0005593103 puppet-user[65880]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:28 np0005593103 puppet-user[65880]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:28 np0005593103 puppet-user[65880]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:28 np0005593103 systemd[1]: var-lib-containers-storage-overlay-e2d86512cc5d4d83166ff9bad4e3dd65ab3792a631caeb014dbd42fd3b2727c2-merged.mount: Deactivated successfully. Jan 23 09:10:28 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-a88249c44270782cf5a4aa81735be824b22ff8f63f2bb683fde1aff8a57ea0fb-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.92 seconds Jan 23 09:10:28 np0005593103 podman[66810]: 2026-01-23 09:10:28.566059871 +0000 UTC m=+0.080077358 container create de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-placement, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, managed_by=tripleo_ansible, tcib_managed=true, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, url=https://www.redhat.com, build-date=2025-11-18T23:41:26Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, distribution-scope=public, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20251118.1, name=rhosp17/openstack-placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, release=1761123044, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-placement-api-container, version=17.1.12) Jan 23 09:10:28 np0005593103 ovs-vsctl[66845]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Jan 23 09:10:28 np0005593103 systemd[1]: Started libpod-conmon-de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3.scope. Jan 23 09:10:28 np0005593103 puppet-user[66086]: Warning: Unknown variable: '::nova::scheduler::filter::scheduler_max_attempts'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 122, column: 29) Jan 23 09:10:28 np0005593103 puppet-user[66086]: Warning: Unknown variable: '::nova::scheduler::filter::periodic_task_interval'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 123, column: 39) Jan 23 09:10:28 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:28 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/50767533701b2ca813631e72b44a44ffa07dc730078146aa61421a8cd81f2ee9/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:28 np0005593103 puppet-user[66086]: Warning: Scope(Class[Nova::Scheduler::Filter]): The nova::scheduler::filter::scheduler_max_attempts parameter has been deprecated and \ Jan 23 09:10:28 np0005593103 puppet-user[66086]: will be removed in a future release. Use the nova::scheduler::max_attempts parameter instead. Jan 23 09:10:28 np0005593103 podman[66810]: 2026-01-23 09:10:28.609516401 +0000 UTC m=+0.123533898 container init de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.4, name=rhosp17/openstack-placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64, io.openshift.expose-services=, managed_by=tripleo_ansible, com.redhat.component=openstack-placement-api-container, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, build-date=2025-11-18T23:41:26Z, version=17.1.12, container_name=container-puppet-placement, tcib_managed=true, config_id=tripleo_puppet_step1, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vcs-type=git) Jan 23 09:10:28 np0005593103 podman[66810]: 2026-01-23 09:10:28.620620007 +0000 UTC m=+0.134637504 container start de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, io.buildah.version=1.41.4, build-date=2025-11-18T23:41:26Z, com.redhat.component=openstack-placement-api-container, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, container_name=container-puppet-placement, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, architecture=x86_64, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp17/openstack-placement-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, release=1761123044, version=17.1.12, tcib_managed=true) Jan 23 09:10:28 np0005593103 podman[66810]: 2026-01-23 09:10:28.620883864 +0000 UTC m=+0.134901361 container attach de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, url=https://www.redhat.com, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, vcs-type=git, vendor=Red Hat, Inc., org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, io.openshift.expose-services=, container_name=container-puppet-placement, com.redhat.component=openstack-placement-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T23:41:26Z, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp17/openstack-placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api) Jan 23 09:10:28 np0005593103 podman[66810]: 2026-01-23 09:10:28.524533143 +0000 UTC m=+0.038550650 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:28 np0005593103 puppet-user[66492]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:28 np0005593103 puppet-user[66492]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:28 np0005593103 puppet-user[66492]: (file & line not available) Jan 23 09:10:28 np0005593103 puppet-user[66492]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:28 np0005593103 puppet-user[66492]: (file & line not available) Jan 23 09:10:28 np0005593103 puppet-user[66492]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.09 seconds Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:28 np0005593103 puppet-user[66503]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:28 np0005593103 puppet-user[66503]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:28 np0005593103 puppet-user[66503]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:28 np0005593103 puppet-user[66503]: (file & line not available) Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/bind_host]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[66492]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/File[/etc/logrotate-crond.conf]/ensure: defined content as '{sha256}1c3202f58bd2ae16cb31badcbb7f0d4e6697157b987d1887736ad96bb73d70b0' Jan 23 09:10:28 np0005593103 puppet-user[66503]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:28 np0005593103 puppet-user[66503]: (file & line not available) Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/auth_strategy]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/core_plugin]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[66492]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/Cron[logrotate-crond]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/host]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dns_domain]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dhcp_agent_notification]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[66492]: Notice: Applied catalog in 0.04 seconds Jan 23 09:10:28 np0005593103 puppet-user[66492]: Application: Jan 23 09:10:28 np0005593103 puppet-user[66492]: Initial environment: production Jan 23 09:10:28 np0005593103 puppet-user[66492]: Converged environment: production Jan 23 09:10:28 np0005593103 puppet-user[66492]: Run mode: user Jan 23 09:10:28 np0005593103 puppet-user[66492]: Changes: Jan 23 09:10:28 np0005593103 puppet-user[66492]: Total: 2 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Events: Jan 23 09:10:28 np0005593103 puppet-user[66492]: Success: 2 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Total: 2 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Resources: Jan 23 09:10:28 np0005593103 puppet-user[66492]: Changed: 2 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Out of sync: 2 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Skipped: 7 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Total: 9 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Time: Jan 23 09:10:28 np0005593103 puppet-user[66492]: File: 0.01 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Cron: 0.01 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Transaction evaluation: 0.03 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Catalog application: 0.04 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Config retrieval: 0.13 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Last run: 1769159428 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Total: 0.04 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Version: Jan 23 09:10:28 np0005593103 puppet-user[66492]: Config: 1769159428 Jan 23 09:10:28 np0005593103 puppet-user[66492]: Puppet: 7.10.0 Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/allow_overlapping_ips]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/global_physnet_mtu]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/vlan_transparent]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[agent/root_helper]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[agent/report_interval]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/service_plugins]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_url]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/username]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/password]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_domain_name]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_name]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/user_domain_name]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/region_name]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/endpoint_type]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_type]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_url]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/username]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/password]/ensure: created Jan 23 09:10:28 np0005593103 puppet-user[66503]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Jan 23 09:10:28 np0005593103 puppet-user[66503]: in a future release. Use nova::cinder::os_region_name instead Jan 23 09:10:28 np0005593103 puppet-user[66503]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Jan 23 09:10:28 np0005593103 puppet-user[66503]: in a future release. Use nova::cinder::catalog_info instead Jan 23 09:10:28 np0005593103 puppet-user[66503]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Jan 23 09:10:28 np0005593103 puppet-user[66503]: removed in a future realse. Use nova::db::database_connection instead Jan 23 09:10:28 np0005593103 puppet-user[66503]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Jan 23 09:10:28 np0005593103 puppet-user[66503]: removed in a future realse. Use nova::db::api_database_connection instead Jan 23 09:10:28 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_domain_name]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_name]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/user_domain_name]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/region_name]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_type]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/l3_ha]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/max_l3_agents_per_router]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/api_workers]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/rpc_workers]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/agent_down_time]/ensure: created Jan 23 09:10:29 np0005593103 systemd[1]: libpod-566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09.scope: Deactivated successfully. Jan 23 09:10:29 np0005593103 systemd[1]: libpod-566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09.scope: Consumed 2.197s CPU time. Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/router_scheduler_driver]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/allow_automatic_l3agent_failover]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server/Neutron_config[ovs/igmp_snooping_enable]/ensure: created Jan 23 09:10:29 np0005593103 podman[67002]: 2026-01-23 09:10:29.113355155 +0000 UTC m=+0.043486952 container died 566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, io.buildah.version=1.41.4, container_name=container-puppet-crond, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-cron-container, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, vcs-type=git, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 cron, managed_by=tripleo_ansible, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, release=1761123044, build-date=2025-11-18T22:49:32Z, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-cron, maintainer=OpenStack TripleO Team) Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_port]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_security_group]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_network_gateway]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Warning: Scope(Apache::Vhost[nova_api_wsgi]): Jan 23 09:10:29 np0005593103 puppet-user[66086]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:29 np0005593103 puppet-user[66086]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:29 np0005593103 puppet-user[66086]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:29 np0005593103 puppet-user[66086]: file names. Jan 23 09:10:29 np0005593103 puppet-user[66086]: Jan 23 09:10:29 np0005593103 puppet-user[66086]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:29 np0005593103 puppet-user[66086]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:29 np0005593103 puppet-user[66086]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_packet_filter]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/neutron/plugin.ini]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/default/neutron-server]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/type_drivers]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66503]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/tenant_network_types]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/mechanism_drivers]/ensure: created Jan 23 09:10:29 np0005593103 podman[67002]: 2026-01-23 09:10:29.17427361 +0000 UTC m=+0.104405377 container cleanup 566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, container_name=container-puppet-crond, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, distribution-scope=public, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, release=1761123044, io.openshift.expose-services=, vcs-type=git, name=rhosp17/openstack-cron, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, com.redhat.component=openstack-cron-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:32Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, managed_by=tripleo_ansible, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, config_id=tripleo_puppet_step1) Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/path_mtu]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/extension_drivers]/ensure: created Jan 23 09:10:29 np0005593103 systemd[1]: libpod-conmon-566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09.scope: Deactivated successfully. Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/overlay_ip_version]/ensure: created Jan 23 09:10:29 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-crond --conmon-pidfile /run/container-puppet-crond.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=crond --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::logrotate --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-crond --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-crond.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/control_exchange]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Oslo::Concurrency[neutron_config]/Neutron_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.78 seconds Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/debug]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:29 np0005593103 systemd[1]: var-lib-containers-storage-overlay-da14c1744c512d62b2a12ea62a5b7599d08525a06bb2dc0dd21d2b7f32901ad8-merged.mount: Deactivated successfully. Jan 23 09:10:29 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-566b8335c8c3f6db146c7c94cc073bce2c5ca54d972138b412e062785a0e9a09-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}5c902aa3c0763871a979109c49ed76fec319f3bf35a2609f2a0e8255a8604e4b' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:29 np0005593103 podman[67076]: 2026-01-23 09:10:29.651652659 +0000 UTC m=+0.073327848 container create d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, build-date=2025-11-18T22:49:50Z, url=https://www.redhat.com, architecture=x86_64, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20251118.1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, name=rhosp17/openstack-rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, config_id=tripleo_puppet_step1, container_name=container-puppet-rabbitmq, com.redhat.component=openstack-rabbitmq-container, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, io.openshift.expose-services=) Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}b8a60ed04f45c2616ded10652c00040e1164ef72f6b6380e0c48acddb632b617' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:29 np0005593103 systemd[1]: Started libpod-conmon-d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8.scope. Jan 23 09:10:29 np0005593103 puppet-user[66707]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:29 np0005593103 puppet-user[66707]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:29 np0005593103 puppet-user[66707]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:29 np0005593103 puppet-user[66707]: (file & line not available) Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:29 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:29 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0e774d82a3bdfed72d87ea8479c2b370163929fdcc1b057d5463bae281375f5f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/connection]/ensure: created Jan 23 09:10:29 np0005593103 podman[67076]: 2026-01-23 09:10:29.618495714 +0000 UTC m=+0.040170913 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 09:10:29 np0005593103 podman[67076]: 2026-01-23 09:10:29.718876472 +0000 UTC m=+0.140551661 container init d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.4, build-date=2025-11-18T22:49:50Z, vendor=Red Hat, Inc., architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, com.redhat.component=openstack-rabbitmq-container, tcib_managed=true, io.openshift.expose-services=, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, name=rhosp17/openstack-rabbitmq, container_name=container-puppet-rabbitmq) Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:29 np0005593103 podman[67076]: 2026-01-23 09:10:29.729408224 +0000 UTC m=+0.151083473 container start d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, com.redhat.component=openstack-rabbitmq-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:50Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, version=17.1.12, config_id=tripleo_puppet_step1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, container_name=container-puppet-rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, managed_by=tripleo_ansible, name=rhosp17/openstack-rabbitmq, release=1761123044, url=https://www.redhat.com, io.openshift.expose-services=, vendor=Red Hat, Inc.) Jan 23 09:10:29 np0005593103 podman[67076]: 2026-01-23 09:10:29.72965261 +0000 UTC m=+0.151327809 container attach d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, distribution-scope=public, name=rhosp17/openstack-rabbitmq, container_name=container-puppet-rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T22:49:50Z, summary=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, vcs-type=git, tcib_managed=true, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, io.openshift.expose-services=, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-rabbitmq-container) Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:29 np0005593103 puppet-user[66707]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:29 np0005593103 puppet-user[66707]: (file & line not available) Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/max_retries]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/db_max_retries]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Policy/Oslo::Policy[neutron_config]/Neutron_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[nova_api_wsgi]/ensure: defined content as '{sha256}901cc9636a87a089b1b6620430d7a36909add0ca7dc2216b74d7bb9dc627d776' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Server/Oslo::Middleware[neutron_config]/Neutron_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/max_header_size]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/vni_ranges]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vxlan_group]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vni_ranges]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vlan]/Neutron_plugin_ml2[ml2_type_vlan/network_vlan_ranges]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[flat]/Neutron_plugin_ml2[ml2_type_flat/flat_networks]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_connection]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_connection]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_private_key]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_certificate]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_ca_cert]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_private_key]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_certificate]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_ca_cert]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_connection_timeout]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_probe_interval]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/neutron_sync_mode]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_metadata_enabled]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/enable_distributed_floating_ip]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/dns_servers]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_emit_need_to_frag]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/rate_limit]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/burst_limit]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[66707]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.32 seconds Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:29 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:30 np0005593103 puppet-user[65880]: Notice: /Stage[main]/Tripleo::Profile::Base::Neutron::Server/Tripleo::Tls_proxy[neutron-api]/Apache::Vhost[neutron-api-proxy]/Concat[25-neutron-api-proxy.conf]/File[/etc/httpd/conf.d/25-neutron-api-proxy.conf]/ensure: defined content as '{sha256}98909bc33dd10c99944d19bd22a6902996ff42fb665eb63f8c8c255e15cc4d08' Jan 23 09:10:30 np0005593103 puppet-user[65880]: Notice: Applied catalog in 1.51 seconds Jan 23 09:10:30 np0005593103 puppet-user[65880]: Application: Jan 23 09:10:30 np0005593103 puppet-user[65880]: Initial environment: production Jan 23 09:10:30 np0005593103 puppet-user[65880]: Converged environment: production Jan 23 09:10:30 np0005593103 puppet-user[65880]: Run mode: user Jan 23 09:10:30 np0005593103 puppet-user[65880]: Changes: Jan 23 09:10:30 np0005593103 puppet-user[65880]: Total: 137 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Events: Jan 23 09:10:30 np0005593103 puppet-user[65880]: Success: 137 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Total: 137 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Resources: Jan 23 09:10:30 np0005593103 puppet-user[65880]: Changed: 137 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Out of sync: 137 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Skipped: 41 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Total: 384 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Time: Jan 23 09:10:30 np0005593103 puppet-user[65880]: Resources: 0.00 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Concat fragment: 0.00 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Concat file: 0.00 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Augeas: 0.02 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Package: 0.03 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Neutron plugin ml2: 0.07 Jan 23 09:10:30 np0005593103 puppet-user[65880]: File: 0.15 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Neutron config: 0.89 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Transaction evaluation: 1.46 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Catalog application: 1.51 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Last run: 1769159430 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Config retrieval: 2.08 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Total: 1.51 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Version: Jan 23 09:10:30 np0005593103 puppet-user[65880]: Config: 1769159426 Jan 23 09:10:30 np0005593103 puppet-user[65880]: Puppet: 7.10.0 Jan 23 09:10:30 np0005593103 ovs-vsctl[67168]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:172.17.0.103:6642,ssl:172.17.0.104:6642,ssl:172.17.0.105:6642 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67170]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-type]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67172]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=172.19.0.105 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-ip]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Warning: Scope(Apache::Vhost[nova_metadata_wsgi]): Jan 23 09:10:30 np0005593103 puppet-user[66503]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:30 np0005593103 puppet-user[66503]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:30 np0005593103 puppet-user[66503]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:30 np0005593103 puppet-user[66503]: file names. Jan 23 09:10:30 np0005593103 puppet-user[66503]: Jan 23 09:10:30 np0005593103 puppet-user[66503]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:30 np0005593103 puppet-user[66503]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:30 np0005593103 puppet-user[66503]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67175]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005593103.ooo.test Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:hostname]/value: value changed 'np0005593103.novalocal' to 'np0005593103.ooo.test' Jan 23 09:10:30 np0005593103 ovs-vsctl[67177]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67179]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote-probe-interval]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67181]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.62 seconds Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-openflow-probe-interval]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67183]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=true Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-monitor-all]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67186]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-ofctrl-wait-before-clear]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67189]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-tos=0 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-tos]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/instance_name_template]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/enabled_apis]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Nova_config[wsgi/api_paste_config]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67198]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-chassis-mac-mappings=datacentre:fa:16:3e:22:40:f5 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-chassis-mac-mappings]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen_port]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67208]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=datacentre:br-ex Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_workers]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge-mappings]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Nova_config[api/use_forwarded_for]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Nova_config[api/max_limit]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67217]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-match-northd-version]/ensure: created Jan 23 09:10:30 np0005593103 ovs-vsctl[67239]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:garp-max-timeout-sec=0 Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/allow_resize_to_same_host]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:garp-max-timeout-sec]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66707]: Notice: Applied catalog in 0.61 seconds Jan 23 09:10:30 np0005593103 puppet-user[66707]: Application: Jan 23 09:10:30 np0005593103 puppet-user[66707]: Initial environment: production Jan 23 09:10:30 np0005593103 puppet-user[66707]: Converged environment: production Jan 23 09:10:30 np0005593103 puppet-user[66707]: Run mode: user Jan 23 09:10:30 np0005593103 puppet-user[66707]: Changes: Jan 23 09:10:30 np0005593103 puppet-user[66707]: Total: 14 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Events: Jan 23 09:10:30 np0005593103 puppet-user[66707]: Success: 14 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Total: 14 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Resources: Jan 23 09:10:30 np0005593103 puppet-user[66707]: Skipped: 12 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Changed: 14 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Out of sync: 14 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Total: 29 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Time: Jan 23 09:10:30 np0005593103 puppet-user[66707]: Exec: 0.02 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Config retrieval: 0.35 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Vs config: 0.48 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Transaction evaluation: 0.60 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Catalog application: 0.61 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Last run: 1769159430 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Total: 0.61 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Version: Jan 23 09:10:30 np0005593103 puppet-user[66707]: Config: 1769159429 Jan 23 09:10:30 np0005593103 puppet-user[66707]: Puppet: 7.10.0 Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:30 np0005593103 puppet-user[66904]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:30 np0005593103 puppet-user[66904]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:30 np0005593103 puppet-user[66904]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:30 np0005593103 puppet-user[66904]: (file & line not available) Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:30 np0005593103 puppet-user[66904]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:30 np0005593103 puppet-user[66904]: (file & line not available) Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}22919079f5de3fecd0e6d991670d896cd7725c46701dbde26ca064af36c4bcba' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:30 np0005593103 systemd[1]: libpod-ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a.scope: Deactivated successfully. Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:30 np0005593103 systemd[1]: libpod-ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a.scope: Consumed 6.024s CPU time. Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:30 np0005593103 podman[65796]: 2026-01-23 09:10:30.844328744 +0000 UTC m=+6.579889907 container died ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, io.buildah.version=1.41.4, architecture=x86_64, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, summary=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, container_name=container-puppet-neutron, maintainer=OpenStack TripleO Team, release=1761123044, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, vcs-type=git, vendor=Red Hat, Inc., name=rhosp17/openstack-neutron-server, url=https://www.redhat.com, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, tcib_managed=true, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:23:27Z, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server) Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Jan 23 09:10:30 np0005593103 systemd[1]: tmp-crun.tURJ4k.mount: Deactivated successfully. Jan 23 09:10:30 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:30 np0005593103 systemd[1]: var-lib-containers-storage-overlay-34459ad1f7fa4fc20518a582eb6daa59ded88797f6d8f9ef56bae4eb481c78b5-merged.mount: Deactivated successfully. Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Jan 23 09:10:30 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Jan 23 09:10:31 np0005593103 podman[67312]: 2026-01-23 09:10:31.004427886 +0000 UTC m=+0.149908802 container cleanup ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 neutron-server, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, batch=17.1_20251118.1, vendor=Red Hat, Inc., io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 neutron-server, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, com.redhat.component=openstack-neutron-server-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp17/openstack-neutron-server, tcib_managed=true, container_name=container-puppet-neutron, build-date=2025-11-19T00:23:27Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, vcs-type=git, distribution-scope=public, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c) Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Conductor/Nova_config[conductor/workers]/ensure: created Jan 23 09:10:31 np0005593103 systemd[1]: libpod-conmon-ae1557ade5e5962b9565adfb41632ceefb157c4f3e1ea6b4aed0f88b98db408a.scope: Deactivated successfully. Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Jan 23 09:10:31 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-neutron --conmon-pidfile /run/container-puppet-neutron.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2 --env NAME=neutron --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::server#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::neutron::plugins::ml2#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-neutron --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-neutron.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Jan 23 09:10:31 np0005593103 systemd[1]: libpod-2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b.scope: Deactivated successfully. Jan 23 09:10:31 np0005593103 systemd[1]: libpod-2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b.scope: Consumed 3.131s CPU time. Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/workers]/ensure: created Jan 23 09:10:31 np0005593103 podman[66673]: 2026-01-23 09:10:31.027870821 +0000 UTC m=+3.487580823 container died 2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, name=rhosp17/openstack-ovn-controller, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, vcs-type=git, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T23:34:05Z, architecture=x86_64, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, managed_by=tripleo_ansible, container_name=container-puppet-ovn_controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, config_id=tripleo_puppet_step1, com.redhat.component=openstack-ovn-controller-container, io.buildah.version=1.41.4, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, distribution-scope=public, version=17.1.12, url=https://www.redhat.com) Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/discover_hosts_in_cells_interval]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_image_type_support]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Jan 23 09:10:31 np0005593103 podman[67354]: 2026-01-23 09:10:31.151879379 +0000 UTC m=+0.107557170 container cleanup 2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 ovn-controller, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, container_name=container-puppet-ovn_controller, name=rhosp17/openstack-ovn-controller, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, com.redhat.component=openstack-ovn-controller-container, vendor=Red Hat, Inc., batch=17.1_20251118.1, build-date=2025-11-18T23:34:05Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.expose-services=) Jan 23 09:10:31 np0005593103 systemd[1]: libpod-conmon-2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b.scope: Deactivated successfully. Jan 23 09:10:31 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ovn_controller --conmon-pidfile /run/container-puppet-ovn_controller.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,vs_config,exec --env NAME=ovn_controller --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::agents::ovn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ovn_controller --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ovn_controller.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /etc/sysconfig/modules:/etc/sysconfig/modules --volume /lib/modules:/lib/modules:ro --volume /run/openvswitch:/run/openvswitch:shared,z --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/limit_tenants_to_placement_aggregate]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/placement_aggregate_required_for_tenants]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/enable_isolated_aggregate_filtering]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_availability_zone]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_routed_network_aggregates]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/host_subset_size]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/weight_classes]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/shuffle_best_same_weighed_hosts]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_ca_certs]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_cert]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_key]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_host]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_port]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/auth_schemes]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Jan 23 09:10:31 np0005593103 podman[67457]: 2026-01-23 09:10:31.52892665 +0000 UTC m=+0.078954967 container create ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.openshift.expose-services=, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-redis-container, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, batch=17.1_20251118.1, vcs-type=git, build-date=2025-11-18T22:49:49Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, io.buildah.version=1.41.4, container_name=container-puppet-redis, version=17.1.12, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., name=rhosp17/openstack-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Jan 23 09:10:31 np0005593103 systemd[1]: Started libpod-conmon-ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344.scope. Jan 23 09:10:31 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Jan 23 09:10:31 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1e75127e3dae8a2d0eb1021eb832a6dc07956cc9f39b6b26fdd0b1a857b7768b/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Jan 23 09:10:31 np0005593103 podman[67457]: 2026-01-23 09:10:31.575870623 +0000 UTC m=+0.125898940 container init ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, build-date=2025-11-18T22:49:49Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-redis, vendor=Red Hat, Inc., url=https://www.redhat.com, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.openshift.expose-services=, vcs-type=git, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, config_id=tripleo_puppet_step1, architecture=x86_64, version=17.1.12, description=Red Hat OpenStack Platform 17.1 redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-redis-container, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, batch=17.1_20251118.1) Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Jan 23 09:10:31 np0005593103 podman[67457]: 2026-01-23 09:10:31.487405182 +0000 UTC m=+0.037433499 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 09:10:31 np0005593103 podman[67457]: 2026-01-23 09:10:31.593935875 +0000 UTC m=+0.143964192 container start ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, container_name=container-puppet-redis, summary=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-redis-container, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, build-date=2025-11-18T22:49:49Z, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-redis, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, architecture=x86_64, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 redis) Jan 23 09:10:31 np0005593103 podman[67457]: 2026-01-23 09:10:31.594275734 +0000 UTC m=+0.144304041 container attach ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-redis, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-redis-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, build-date=2025-11-18T22:49:49Z, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, version=17.1.12, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Jan 23 09:10:31 np0005593103 podman[67483]: 2026-01-23 09:10:31.651572383 +0000 UTC m=+0.115334078 container create c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, managed_by=tripleo_ansible, io.buildah.version=1.41.4, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, architecture=x86_64, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.expose-services=, com.redhat.component=openstack-rsyslog-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-rsyslog, tcib_managed=true, release=1761123044, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 rsyslog, build-date=2025-11-18T22:49:49Z, config_id=tripleo_puppet_step1, distribution-scope=public) Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Jan 23 09:10:31 np0005593103 podman[67483]: 2026-01-23 09:10:31.568455635 +0000 UTC m=+0.032217340 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Metadata/Nova_config[api/local_metadata_per_cell]/ensure: created Jan 23 09:10:31 np0005593103 systemd[1]: Started libpod-conmon-c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415.scope. Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/service_metadata_proxy]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Jan 23 09:10:31 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:31 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b6b87bbf0129cbf4c999df20a2e3be86f53cca83baa41339fa2c6963deee88ce/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/metadata_proxy_shared_secret]/ensure: created Jan 23 09:10:31 np0005593103 podman[67483]: 2026-01-23 09:10:31.693727368 +0000 UTC m=+0.157489063 container init c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-rsyslog, batch=17.1_20251118.1, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, release=1761123044, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, container_name=container-puppet-rsyslog, maintainer=OpenStack TripleO Team, version=17.1.12, com.redhat.component=openstack-rsyslog-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, io.openshift.expose-services=) Jan 23 09:10:31 np0005593103 podman[67483]: 2026-01-23 09:10:31.709023656 +0000 UTC m=+0.172785351 container start c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, distribution-scope=public, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-rsyslog, architecture=x86_64, batch=17.1_20251118.1, container_name=container-puppet-rsyslog, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 rsyslog, config_id=tripleo_puppet_step1, version=17.1.12, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, managed_by=tripleo_ansible, com.redhat.component=openstack-rsyslog-container, vendor=Red Hat, Inc., io.openshift.expose-services=, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, url=https://www.redhat.com) Jan 23 09:10:31 np0005593103 podman[67483]: 2026-01-23 09:10:31.70955876 +0000 UTC m=+0.173320455 container attach c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-rsyslog, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, architecture=x86_64, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, vcs-type=git, io.buildah.version=1.41.4, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, build-date=2025-11-18T22:49:49Z, distribution-scope=public, url=https://www.redhat.com, name=rhosp17/openstack-rsyslog, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-rsyslog-container, summary=Red Hat OpenStack Platform 17.1 rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.expose-services=, config_id=tripleo_puppet_step1) Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66904]: Warning: Scope(Apache::Vhost[placement_wsgi]): Jan 23 09:10:31 np0005593103 puppet-user[66904]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:31 np0005593103 puppet-user[66904]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:31 np0005593103 puppet-user[66904]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:31 np0005593103 puppet-user[66904]: file names. Jan 23 09:10:31 np0005593103 puppet-user[66904]: Jan 23 09:10:31 np0005593103 puppet-user[66904]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:31 np0005593103 puppet-user[66904]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:31 np0005593103 puppet-user[66904]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:31 np0005593103 systemd[1]: var-lib-containers-storage-overlay-e79b09920cc5b23070198d9343d3b3c4406065eb0399e0d8cdb5c546174809b9-merged.mount: Deactivated successfully. Jan 23 09:10:31 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-2bc181434ea599af6fcdb0c0bc39d5cd1f194cf82bfa863ee3241c6c223ef87b-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:31 np0005593103 puppet-user[66904]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.29 seconds Jan 23 09:10:31 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:31 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/debug]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_file]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_dir]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Db/Oslo::Db[placement_config]/Placement_config[placement_database/connection]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}0889d5d4162a37cb7c01c0b4592bff319a68ed3234db4c6fe76b038263afa24e' Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_scope]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_new_defaults]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Wsgi::Apache/File[/etc/httpd/conf.d/00-placement-api.conf]/content: content changed '{sha256}829e74856246ff8f4a56a4995cd421edd210e3c0342c998de9e934d33c2d229f' to '{sha256}a742a33fca7bd0225b70d9c9c3f9977f3f5b1391a7c4db389c2e405e7a0e7ecc' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[/var/www/cgi-bin/placement]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[placement_wsgi]/ensure: defined content as '{sha256}7330573e2f484b77671e7cd10bec4bf8fe4471ba5a127b8362286c6c89a050fe' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/Apache::Vhost[placement_wsgi]/Concat[10-placement_wsgi.conf]/File[/etc/httpd/conf.d/10-placement_wsgi.conf]/ensure: defined content as '{sha256}f788ce5a753f7eb14434b504616232cfd1fbfcd627ffe1d3ea5f93c7dd512f09' Jan 23 09:10:32 np0005593103 puppet-user[66904]: Notice: Applied catalog in 0.50 seconds Jan 23 09:10:32 np0005593103 puppet-user[66904]: Application: Jan 23 09:10:32 np0005593103 puppet-user[66904]: Initial environment: production Jan 23 09:10:32 np0005593103 puppet-user[66904]: Converged environment: production Jan 23 09:10:32 np0005593103 puppet-user[66904]: Run mode: user Jan 23 09:10:32 np0005593103 puppet-user[66904]: Changes: Jan 23 09:10:32 np0005593103 puppet-user[66904]: Total: 63 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Events: Jan 23 09:10:32 np0005593103 puppet-user[66904]: Success: 63 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Total: 63 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Resources: Jan 23 09:10:32 np0005593103 puppet-user[66904]: Skipped: 31 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Changed: 63 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Out of sync: 63 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Total: 208 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Time: Jan 23 09:10:32 np0005593103 puppet-user[66904]: Concat file: 0.00 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Anchor: 0.00 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Concat fragment: 0.00 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Augeas: 0.02 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Package: 0.03 Jan 23 09:10:32 np0005593103 puppet-user[66904]: File: 0.11 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Placement config: 0.11 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Transaction evaluation: 0.50 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Catalog application: 0.50 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Config retrieval: 1.40 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Last run: 1769159432 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Total: 0.51 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Version: Jan 23 09:10:32 np0005593103 puppet-user[66904]: Config: 1769159430 Jan 23 09:10:32 np0005593103 puppet-user[66904]: Puppet: 7.10.0 Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:32 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Jan 23 09:10:32 np0005593103 systemd[1]: libpod-de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3.scope: Deactivated successfully. Jan 23 09:10:33 np0005593103 systemd[1]: libpod-de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3.scope: Consumed 4.106s CPU time. Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_scope]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_new_defaults]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/policy_file]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Jan 23 09:10:33 np0005593103 podman[67741]: 2026-01-23 09:10:33.071266136 +0000 UTC m=+0.049906023 container died de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T23:41:26Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, com.redhat.component=openstack-placement-api-container, release=1761123044, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, managed_by=tripleo_ansible, name=rhosp17/openstack-placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, container_name=container-puppet-placement, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d) Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Jan 23 09:10:33 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:33 np0005593103 systemd[1]: var-lib-containers-storage-overlay-50767533701b2ca813631e72b44a44ffa07dc730078146aa61421a8cd81f2ee9-merged.mount: Deactivated successfully. Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Api/Oslo::Middleware[nova_config]/Nova_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Jan 23 09:10:33 np0005593103 podman[67741]: 2026-01-23 09:10:33.126602732 +0000 UTC m=+0.105242589 container cleanup de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, build-date=2025-11-18T23:41:26Z, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp17/openstack-placement-api, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, tcib_managed=true, distribution-scope=public, url=https://www.redhat.com, architecture=x86_64, com.redhat.component=openstack-placement-api-container, container_name=container-puppet-placement, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:33 np0005593103 systemd[1]: libpod-conmon-de366c5745762786d656cc14fbbeabc14eea11fe5869dc207a5b5cbf3a20a3a3.scope: Deactivated successfully. Jan 23 09:10:33 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-placement --conmon-pidfile /run/container-puppet-placement.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,placement_config --env NAME=placement --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::placement::api --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-placement --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-placement.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Cron::Archive_deleted_rows/Cron[nova-manage db archive_deleted_rows]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Cron::Purge_shadow_tables/Cron[nova-manage db purge]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/Apache::Vhost[nova_api_wsgi]/Concat[10-nova_api_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_api_wsgi.conf]/ensure: defined content as '{sha256}e932c1626e1c01b0447a5e93c34162aaef3ddc7b57542ffaf08287970118772f' Jan 23 09:10:33 np0005593103 puppet-user[66086]: Notice: Applied catalog in 3.87 seconds Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66086]: Application: Jan 23 09:10:33 np0005593103 puppet-user[66086]: Initial environment: production Jan 23 09:10:33 np0005593103 puppet-user[66086]: Converged environment: production Jan 23 09:10:33 np0005593103 puppet-user[66086]: Run mode: user Jan 23 09:10:33 np0005593103 puppet-user[66086]: Changes: Jan 23 09:10:33 np0005593103 puppet-user[66086]: Total: 156 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Events: Jan 23 09:10:33 np0005593103 puppet-user[66086]: Success: 156 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Total: 156 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Resources: Jan 23 09:10:33 np0005593103 puppet-user[66086]: Changed: 156 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Out of sync: 156 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Skipped: 45 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Total: 511 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Time: Jan 23 09:10:33 np0005593103 puppet-user[66086]: Anchor: 0.00 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Concat file: 0.00 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Concat fragment: 0.00 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Augeas: 0.02 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Package: 0.03 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Cron: 0.07 Jan 23 09:10:33 np0005593103 puppet-user[66086]: File: 0.13 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Config retrieval: 1.98 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Last run: 1769159433 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Nova config: 3.22 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Transaction evaluation: 3.85 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Catalog application: 3.87 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Resources: 0.00 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Total: 3.88 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Version: Jan 23 09:10:33 np0005593103 puppet-user[66086]: Config: 1769159427 Jan 23 09:10:33 np0005593103 puppet-user[66086]: Puppet: 7.10.0 Jan 23 09:10:33 np0005593103 podman[67831]: 2026-01-23 09:10:33.468349281 +0000 UTC m=+0.061899832 container create 241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, release=1761123044, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.4, com.redhat.component=openstack-swift-proxy-server-container, distribution-scope=public, config_id=tripleo_puppet_step1, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-19T00:12:50Z, version=17.1.12, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, vendor=Red Hat, Inc., io.openshift.expose-services=, container_name=container-puppet-swift, maintainer=OpenStack TripleO Team) Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[nova_metadata_wsgi]/ensure: defined content as '{sha256}7311c9047eec89f1e952197038ebb53e3ab5810905e7292a2f802c7e4fc0351c' Jan 23 09:10:33 np0005593103 systemd[1]: Started libpod-conmon-241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d.scope. Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Jan 23 09:10:33 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:33 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0b093877e3a865ed87355f1994ec622bc3d7f907088915d5829f31dd86b106d8/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:33 np0005593103 podman[67831]: 2026-01-23 09:10:33.525443985 +0000 UTC m=+0.118994506 container init 241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-swift-proxy-server-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, container_name=container-puppet-swift, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, name=rhosp17/openstack-swift-proxy-server, release=1761123044, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, architecture=x86_64, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-19T00:12:50Z, tcib_managed=true, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, managed_by=tripleo_ansible, vcs-type=git, config_id=tripleo_puppet_step1) Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:33 np0005593103 podman[67831]: 2026-01-23 09:10:33.532457212 +0000 UTC m=+0.126007733 container start 241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20251118.1, tcib_managed=true, name=rhosp17/openstack-swift-proxy-server, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., release=1761123044, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, build-date=2025-11-19T00:12:50Z, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.4, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, config_id=tripleo_puppet_step1, architecture=x86_64, managed_by=tripleo_ansible, container_name=container-puppet-swift, com.redhat.component=openstack-swift-proxy-server-container, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:33 np0005593103 podman[67831]: 2026-01-23 09:10:33.532897643 +0000 UTC m=+0.126448144 container attach 241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, io.openshift.expose-services=, url=https://www.redhat.com, managed_by=tripleo_ansible, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.12, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:12:50Z, release=1761123044, container_name=container-puppet-swift, io.buildah.version=1.41.4, name=rhosp17/openstack-swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, vendor=Red Hat, Inc.) Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:33 np0005593103 podman[67831]: 2026-01-23 09:10:33.433626845 +0000 UTC m=+0.027177356 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/Apache::Vhost[nova_metadata_wsgi]/Concat[10-nova_metadata_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_metadata_wsgi.conf]/ensure: defined content as '{sha256}b00e3bb46ec29bc952d7ca91a7df3ce5ea52c1dd568df73949e50460510e2dfb' Jan 23 09:10:33 np0005593103 puppet-user[66503]: Notice: Applied catalog in 3.05 seconds Jan 23 09:10:33 np0005593103 puppet-user[66503]: Application: Jan 23 09:10:33 np0005593103 puppet-user[66503]: Initial environment: production Jan 23 09:10:33 np0005593103 puppet-user[66503]: Converged environment: production Jan 23 09:10:33 np0005593103 puppet-user[66503]: Run mode: user Jan 23 09:10:33 np0005593103 puppet-user[66503]: Changes: Jan 23 09:10:33 np0005593103 puppet-user[66503]: Total: 126 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Events: Jan 23 09:10:33 np0005593103 puppet-user[66503]: Success: 126 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Total: 126 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Resources: Jan 23 09:10:33 np0005593103 puppet-user[66503]: Changed: 126 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Out of sync: 126 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Skipped: 37 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Total: 421 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Time: Jan 23 09:10:33 np0005593103 puppet-user[66503]: Concat file: 0.00 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Anchor: 0.00 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Concat fragment: 0.00 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Augeas: 0.02 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Package: 0.03 Jan 23 09:10:33 np0005593103 puppet-user[66503]: File: 0.17 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Config retrieval: 1.81 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Last run: 1769159433 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Nova config: 2.57 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Transaction evaluation: 3.04 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Catalog application: 3.05 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Resources: 0.00 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Total: 3.06 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Version: Jan 23 09:10:33 np0005593103 puppet-user[66503]: Config: 1769159428 Jan 23 09:10:33 np0005593103 puppet-user[66503]: Puppet: 7.10.0 Jan 23 09:10:33 np0005593103 puppet-user[67564]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:33 np0005593103 puppet-user[67564]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:33 np0005593103 puppet-user[67564]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:33 np0005593103 puppet-user[67564]: (file & line not available) Jan 23 09:10:33 np0005593103 puppet-user[67564]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:33 np0005593103 puppet-user[67564]: (file & line not available) Jan 23 09:10:33 np0005593103 puppet-user[67162]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:33 np0005593103 puppet-user[67162]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:33 np0005593103 puppet-user[67162]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:33 np0005593103 puppet-user[67162]: (file & line not available) Jan 23 09:10:33 np0005593103 puppet-user[67162]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:33 np0005593103 puppet-user[67162]: (file & line not available) Jan 23 09:10:33 np0005593103 puppet-user[67162]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.22 seconds Jan 23 09:10:33 np0005593103 puppet-user[67542]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:33 np0005593103 puppet-user[67542]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:33 np0005593103 puppet-user[67542]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:33 np0005593103 puppet-user[67542]: (file & line not available) Jan 23 09:10:34 np0005593103 puppet-user[67564]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.44 seconds Jan 23 09:10:34 np0005593103 puppet-user[67542]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:34 np0005593103 puppet-user[67542]: (file & line not available) Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq]/mode: mode changed '0755' to '2755' Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Tripleo::Profile::Base::Rabbitmq/File[/etc/rabbitmq/ssl-dist.conf]/ensure: defined content as '{sha256}4fcb8b2c0ce7c31ae2a64808de62371e284138a67310e23f1c73dbf139a874c7' Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq/ssl]/ensure: created Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-env.config]/ensure: defined content as '{sha256}fc94417f2a51e57adf071c071b99dbafbd97aa3729c7da31dbd59780839dbde9' Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-inetrc]/ensure: defined content as '{sha256}b83b8080dbcdf2a49fff2f747972e7343801f7518a0f1dcb3e2a301e50aef551' Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Rabbitmq::Config/File[enabled_plugins]/ensure: defined content as '{sha256}3b5c9fba2f1456d923499fc142bc9ef7a7f6d53d6bc4c0ae88310332eb10a31c' Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/security/limits.d/rabbitmq-server.conf]/ensure: defined content as '{sha256}b984a5f0a62696715f206ca0a602fd9d2d497894c6c24502896fb3010ee0c557' Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq.config]/ensure: defined content as '{sha256}2bdea880431f5f4261b7be905470612be80d6bb21fd3aa049555be17488cff48' Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File[/var/lib/rabbitmq/.erlang.cookie]/content: content changed '{sha256}739dc50031dfce1d5e884e9f183d2b8b925f18a6657690c92ae455b2343204dd' to '{sha256}2f7a4fa2366ae6f1f7dea2b261a26589439927f7963d88121341ecda7c26de92' Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-systemd]/ensure: removed Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-succeed]/ensure: created Jan 23 09:10:34 np0005593103 puppet-user[67162]: Notice: Applied catalog in 0.12 seconds Jan 23 09:10:34 np0005593103 puppet-user[67162]: Application: Jan 23 09:10:34 np0005593103 puppet-user[67162]: Initial environment: production Jan 23 09:10:34 np0005593103 puppet-user[67162]: Converged environment: production Jan 23 09:10:34 np0005593103 puppet-user[67162]: Run mode: user Jan 23 09:10:34 np0005593103 puppet-user[67162]: Changes: Jan 23 09:10:34 np0005593103 puppet-user[67162]: Total: 11 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Events: Jan 23 09:10:34 np0005593103 puppet-user[67162]: Success: 11 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Total: 11 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Resources: Jan 23 09:10:34 np0005593103 puppet-user[67162]: Changed: 11 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Out of sync: 11 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Skipped: 9 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Total: 20 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Time: Jan 23 09:10:34 np0005593103 puppet-user[67162]: File line: 0.00 Jan 23 09:10:34 np0005593103 puppet-user[67162]: File: 0.04 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Transaction evaluation: 0.12 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Catalog application: 0.12 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Config retrieval: 0.26 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Last run: 1769159434 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Total: 0.12 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Version: Jan 23 09:10:34 np0005593103 puppet-user[67162]: Config: 1769159433 Jan 23 09:10:34 np0005593103 puppet-user[67162]: Puppet: 7.10.0 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Notice: /Stage[main]/Rsyslog::Base/File[/etc/rsyslog.conf]/content: content changed '{sha256}d6f679f6a4eb6f33f9fc20c846cb30bef93811e1c86bc4da1946dc3100b826c3' to '{sha256}7963bd801fadd49a17561f4d3f80738c3f504b413b11c443432d8303138041f2' Jan 23 09:10:34 np0005593103 puppet-user[67564]: Notice: /Stage[main]/Rsyslog::Config::Global/Rsyslog::Component::Global_config[MaxMessageSize]/Rsyslog::Generate_concat[rsyslog::concat::global_config::MaxMessageSize]/Concat[/etc/rsyslog.d/00_rsyslog.conf]/File[/etc/rsyslog.d/00_rsyslog.conf]/ensure: defined content as '{sha256}a291d5cc6d5884a978161f4c7b5831d43edd07797cc590bae366e7f150b8643b' Jan 23 09:10:34 np0005593103 puppet-user[67564]: Notice: /Stage[main]/Rsyslog::Config::Templates/Rsyslog::Component::Template[rsyslog-node-index]/Rsyslog::Generate_concat[rsyslog::concat::template::rsyslog-node-index]/Concat[/etc/rsyslog.d/50_openstack_logs.conf]/File[/etc/rsyslog.d/50_openstack_logs.conf]/ensure: defined content as '{sha256}2f68a254dfa1cfee7660b3f0933093c73dc1232953279c172d68e4d43315e7b8' Jan 23 09:10:34 np0005593103 puppet-user[67542]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.28 seconds Jan 23 09:10:34 np0005593103 puppet-user[67564]: Notice: Applied catalog in 0.18 seconds Jan 23 09:10:34 np0005593103 puppet-user[67564]: Application: Jan 23 09:10:34 np0005593103 puppet-user[67564]: Initial environment: production Jan 23 09:10:34 np0005593103 puppet-user[67564]: Converged environment: production Jan 23 09:10:34 np0005593103 puppet-user[67564]: Run mode: user Jan 23 09:10:34 np0005593103 puppet-user[67564]: Changes: Jan 23 09:10:34 np0005593103 puppet-user[67564]: Total: 3 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Events: Jan 23 09:10:34 np0005593103 puppet-user[67564]: Success: 3 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Total: 3 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Resources: Jan 23 09:10:34 np0005593103 puppet-user[67564]: Skipped: 11 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Changed: 3 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Out of sync: 3 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Total: 45 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Time: Jan 23 09:10:34 np0005593103 puppet-user[67564]: Concat file: 0.00 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Concat fragment: 0.01 Jan 23 09:10:34 np0005593103 puppet-user[67564]: File: 0.01 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Transaction evaluation: 0.17 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Catalog application: 0.18 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Config retrieval: 0.51 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Last run: 1769159434 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Total: 0.18 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Version: Jan 23 09:10:34 np0005593103 puppet-user[67564]: Config: 1769159433 Jan 23 09:10:34 np0005593103 puppet-user[67564]: Puppet: 7.10.0 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Redis_bundle/File[/etc/redis-tls.conf]/ensure: defined content as '{sha256}7102dc2ae89f130cae52d04b157ad9be2ba3f4b265e97d9e948b33755ee3ac1b' Jan 23 09:10:34 np0005593103 puppet-user[67542]: Notice: /Stage[main]/Tripleo::Stunnel/Concat[/etc/stunnel/stunnel.conf]/File[/etc/stunnel/stunnel.conf]/ensure: defined content as '{sha256}a7e9c69bc07de77e7a0308c1aed280e1274a5e57809f2b0fa7e4a703434bb459' Jan 23 09:10:34 np0005593103 puppet-user[67542]: Notice: /Stage[main]/Redis::Config/File[/etc/redis]/mode: mode changed '0750' to '0755' Jan 23 09:10:34 np0005593103 puppet-user[67542]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/security/limits.d/redis.conf]/ensure: defined content as '{sha256}4723daf91256d1c55ef938214e69b3359209d2df79c3dceb8b8352faf4c8886d' Jan 23 09:10:34 np0005593103 puppet-user[67542]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/systemd/system/redis.service.d/limit.conf]/mode: mode changed '0644' to '0444' Jan 23 09:10:34 np0005593103 systemd[1]: libpod-4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f.scope: Deactivated successfully. Jan 23 09:10:34 np0005593103 systemd[1]: libpod-4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f.scope: Consumed 7.422s CPU time. Jan 23 09:10:34 np0005593103 systemd[1]: libpod-3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11.scope: Deactivated successfully. Jan 23 09:10:34 np0005593103 systemd[1]: libpod-3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11.scope: Consumed 8.472s CPU time. Jan 23 09:10:34 np0005593103 podman[66449]: 2026-01-23 09:10:34.448490165 +0000 UTC m=+7.902762375 container died 4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, url=https://www.redhat.com, io.buildah.version=1.41.4, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.expose-services=, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, release=1761123044, vcs-type=git, architecture=x86_64, batch=17.1_20251118.1, build-date=2025-11-19T00:34:57Z, com.redhat.component=openstack-nova-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, container_name=container-puppet-nova_metadata, name=rhosp17/openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api) Jan 23 09:10:34 np0005593103 puppet-user[67542]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/File[/etc/redis.conf.puppet]/ensure: defined content as '{sha256}e5e6cee42b4144e1067e4195860069cf4387fae792740f3ac9609247cbde950b' Jan 23 09:10:34 np0005593103 systemd[1]: libpod-d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8.scope: Deactivated successfully. Jan 23 09:10:34 np0005593103 systemd[1]: libpod-d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8.scope: Consumed 5.216s CPU time. Jan 23 09:10:34 np0005593103 podman[67076]: 2026-01-23 09:10:34.457478784 +0000 UTC m=+4.879153983 container died d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-rabbitmq, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, release=1761123044, build-date=2025-11-18T22:49:50Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, batch=17.1_20251118.1, url=https://www.redhat.com, name=rhosp17/openstack-rabbitmq, config_id=tripleo_puppet_step1, com.redhat.component=openstack-rabbitmq-container, version=17.1.12, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:34 np0005593103 puppet-user[67542]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/Exec[cp -p /etc/redis.conf.puppet /etc/redis.conf]: Triggered 'refresh' from 1 event Jan 23 09:10:34 np0005593103 puppet-user[67542]: Notice: Applied catalog in 0.13 seconds Jan 23 09:10:34 np0005593103 puppet-user[67542]: Application: Jan 23 09:10:34 np0005593103 puppet-user[67542]: Initial environment: production Jan 23 09:10:34 np0005593103 puppet-user[67542]: Converged environment: production Jan 23 09:10:34 np0005593103 puppet-user[67542]: Run mode: user Jan 23 09:10:34 np0005593103 puppet-user[67542]: Changes: Jan 23 09:10:34 np0005593103 puppet-user[67542]: Total: 7 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Events: Jan 23 09:10:34 np0005593103 puppet-user[67542]: Success: 7 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Total: 7 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Resources: Jan 23 09:10:34 np0005593103 puppet-user[67542]: Restarted: 1 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Changed: 7 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Out of sync: 7 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Skipped: 9 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Total: 25 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Time: Jan 23 09:10:34 np0005593103 puppet-user[67542]: Concat file: 0.00 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Exec: 0.00 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Concat fragment: 0.00 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Augeas: 0.02 Jan 23 09:10:34 np0005593103 puppet-user[67542]: File: 0.07 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Transaction evaluation: 0.13 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Catalog application: 0.13 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Config retrieval: 0.38 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Last run: 1769159434 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Total: 0.13 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Version: Jan 23 09:10:34 np0005593103 puppet-user[67542]: Config: 1769159433 Jan 23 09:10:34 np0005593103 puppet-user[67542]: Puppet: 7.10.0 Jan 23 09:10:34 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:34 np0005593103 systemd[1]: var-lib-containers-storage-overlay-0e774d82a3bdfed72d87ea8479c2b370163929fdcc1b057d5463bae281375f5f-merged.mount: Deactivated successfully. Jan 23 09:10:34 np0005593103 podman[68131]: 2026-01-23 09:10:34.55099003 +0000 UTC m=+0.094074582 container died 3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, maintainer=OpenStack TripleO Team, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, architecture=x86_64, url=https://www.redhat.com, build-date=2025-11-19T00:34:57Z, name=rhosp17/openstack-nova-api, tcib_managed=true, release=1761123044, container_name=container-puppet-nova, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20251118.1, io.buildah.version=1.41.4, managed_by=tripleo_ansible, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.12) Jan 23 09:10:34 np0005593103 systemd[1]: libpod-c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415.scope: Deactivated successfully. Jan 23 09:10:34 np0005593103 systemd[1]: libpod-c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415.scope: Consumed 2.679s CPU time. Jan 23 09:10:34 np0005593103 podman[68145]: 2026-01-23 09:10:34.739733916 +0000 UTC m=+0.271195038 container cleanup d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, architecture=x86_64, vendor=Red Hat, Inc., container_name=container-puppet-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-rabbitmq-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, tcib_managed=true, managed_by=tripleo_ansible, build-date=2025-11-18T22:49:50Z, name=rhosp17/openstack-rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, url=https://www.redhat.com) Jan 23 09:10:34 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rabbitmq --conmon-pidfile /run/container-puppet-rabbitmq.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file,file_line --env NAME=rabbitmq --env STEP_CONFIG=include ::tripleo::packages#012['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::rabbitmq_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rabbitmq --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rabbitmq.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 09:10:34 np0005593103 systemd[1]: libpod-conmon-d9e0f81344f2eb1163791264f5412791dde101ebc91c3391467c553414d14da8.scope: Deactivated successfully. Jan 23 09:10:34 np0005593103 podman[67483]: 2026-01-23 09:10:34.776854276 +0000 UTC m=+3.240615981 container died c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.component=openstack-rsyslog-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, distribution-scope=public, url=https://www.redhat.com, release=1761123044, name=rhosp17/openstack-rsyslog, architecture=x86_64, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.4, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, container_name=container-puppet-rsyslog, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1) Jan 23 09:10:34 np0005593103 podman[68131]: 2026-01-23 09:10:34.836592201 +0000 UTC m=+0.379676723 container cleanup 3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, vendor=Red Hat, Inc., batch=17.1_20251118.1, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, vcs-type=git, description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp17/openstack-nova-api, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, architecture=x86_64, distribution-scope=public, build-date=2025-11-19T00:34:57Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-nova-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, container_name=container-puppet-nova, io.openshift.expose-services=, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, release=1761123044) Jan 23 09:10:34 np0005593103 systemd[1]: libpod-conmon-3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11.scope: Deactivated successfully. Jan 23 09:10:34 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova --conmon-pidfile /run/container-puppet-nova.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config --env NAME=nova --env STEP_CONFIG=include ::tripleo::packages#012['Nova_cell_v2'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::nova::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::conductor#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::vncproxy#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 09:10:34 np0005593103 systemd[1]: libpod-ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344.scope: Deactivated successfully. Jan 23 09:10:34 np0005593103 systemd[1]: libpod-ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344.scope: Consumed 3.097s CPU time. Jan 23 09:10:34 np0005593103 podman[68130]: 2026-01-23 09:10:34.874904502 +0000 UTC m=+0.418860747 container cleanup 4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, name=rhosp17/openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, version=17.1.12, io.buildah.version=1.41.4, build-date=2025-11-19T00:34:57Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, url=https://www.redhat.com, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, container_name=container-puppet-nova_metadata, release=1761123044, config_id=tripleo_puppet_step1) Jan 23 09:10:34 np0005593103 systemd[1]: libpod-conmon-4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f.scope: Deactivated successfully. Jan 23 09:10:34 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova_metadata --conmon-pidfile /run/container-puppet-nova_metadata.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini --env NAME=nova_metadata --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::nova::metadata#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova_metadata --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova_metadata.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Jan 23 09:10:34 np0005593103 podman[67457]: 2026-01-23 09:10:34.927034914 +0000 UTC m=+3.477063271 container died ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, release=1761123044, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, vcs-type=git, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, build-date=2025-11-18T22:49:49Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-redis, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, com.redhat.component=openstack-redis-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, managed_by=tripleo_ansible, container_name=container-puppet-redis, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 redis) Jan 23 09:10:34 np0005593103 podman[68210]: 2026-01-23 09:10:34.937487503 +0000 UTC m=+0.198068996 container cleanup c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, build-date=2025-11-18T22:49:49Z, io.buildah.version=1.41.4, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, name=rhosp17/openstack-rsyslog, release=1761123044, container_name=container-puppet-rsyslog, url=https://www.redhat.com, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 rsyslog, vcs-type=git, batch=17.1_20251118.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 rsyslog, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.component=openstack-rsyslog-container, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Jan 23 09:10:34 np0005593103 systemd[1]: libpod-conmon-c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415.scope: Deactivated successfully. Jan 23 09:10:34 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rsyslog --conmon-pidfile /run/container-puppet-rsyslog.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment --env NAME=rsyslog --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::rsyslog --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rsyslog --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rsyslog.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Jan 23 09:10:35 np0005593103 systemd[1]: var-lib-containers-storage-overlay-b6b87bbf0129cbf4c999df20a2e3be86f53cca83baa41339fa2c6963deee88ce-merged.mount: Deactivated successfully. Jan 23 09:10:35 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-c802ba2e67f6cac39e95023e7209d5905789f59b2a6fdd05af5431cdcf394415-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:35 np0005593103 systemd[1]: var-lib-containers-storage-overlay-bcd01971c066377bd41ab375df337b36185a8263609f61520edf9f0754229985-merged.mount: Deactivated successfully. Jan 23 09:10:35 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4b937c29266de6422def50a54da1a7638f42b43e49c19bb0168cd855a0f47a4f-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:35 np0005593103 systemd[1]: var-lib-containers-storage-overlay-b3b24ac5a4eb5986bb73bd8d7f5bc4ca0ef32115edcdf663effe697e879be2c0-merged.mount: Deactivated successfully. Jan 23 09:10:35 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-3c658e95e7fac0af7649fbb2911bd30f226f4c7280281d59e61bfecdd49a3f11-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:35 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:35 np0005593103 systemd[1]: var-lib-containers-storage-overlay-1e75127e3dae8a2d0eb1021eb832a6dc07956cc9f39b6b26fdd0b1a857b7768b-merged.mount: Deactivated successfully. Jan 23 09:10:35 np0005593103 podman[68273]: 2026-01-23 09:10:35.113018006 +0000 UTC m=+0.226835514 container cleanup ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, tcib_managed=true, build-date=2025-11-18T22:49:49Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-redis, distribution-scope=public, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., com.redhat.component=openstack-redis-container, managed_by=tripleo_ansible, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, summary=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-redis) Jan 23 09:10:35 np0005593103 systemd[1]: libpod-conmon-ee5f0998e1b75166585602f10c3715295836575339882380d12bac857edac344.scope: Deactivated successfully. Jan 23 09:10:35 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-redis --conmon-pidfile /run/container-puppet-redis.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,exec --env NAME=redis --env STEP_CONFIG=include ::tripleo::packages#012Exec <| title == 'systemd-reload-redis' |> { unless => 'true' }#012include tripleo::profile::pacemaker::database::redis_bundle#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-redis --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-redis.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 09:10:35 np0005593103 podman[68402]: 2026-01-23 09:10:35.385022434 +0000 UTC m=+0.098221572 container create ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, io.openshift.expose-services=, container_name=container-puppet-swift_ringbuilder, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, managed_by=tripleo_ansible, build-date=2025-11-19T00:12:50Z, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-proxy-server-container, vcs-type=git, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.4, version=17.1.12, name=rhosp17/openstack-swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, tcib_managed=true, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:35 np0005593103 systemd[1]: Started libpod-conmon-ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f.scope. Jan 23 09:10:35 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:35 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a966ad57f894403a0e47a77e2fa5ddd146b16df02d4783c29c7f444c5ce293fd/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:35 np0005593103 podman[68402]: 2026-01-23 09:10:35.435652526 +0000 UTC m=+0.148851694 container init ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, vcs-type=git, release=1761123044, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-swift-proxy-server-container, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, build-date=2025-11-19T00:12:50Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, version=17.1.12, io.buildah.version=1.41.4, tcib_managed=true, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Jan 23 09:10:35 np0005593103 podman[68402]: 2026-01-23 09:10:35.341304158 +0000 UTC m=+0.054503336 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 09:10:35 np0005593103 podman[68402]: 2026-01-23 09:10:35.447637736 +0000 UTC m=+0.160836914 container start ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, name=rhosp17/openstack-swift-proxy-server, version=17.1.12, com.redhat.component=openstack-swift-proxy-server-container, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, batch=17.1_20251118.1, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., architecture=x86_64, container_name=container-puppet-swift_ringbuilder, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:12:50Z, io.openshift.expose-services=, distribution-scope=public, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Jan 23 09:10:35 np0005593103 podman[68402]: 2026-01-23 09:10:35.447964394 +0000 UTC m=+0.161163572 container attach ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:12:50Z, release=1761123044, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, architecture=x86_64, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, vcs-type=git, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, batch=17.1_20251118.1, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, distribution-scope=public, container_name=container-puppet-swift_ringbuilder, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server) Jan 23 09:10:35 np0005593103 puppet-user[67912]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:35 np0005593103 puppet-user[67912]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:35 np0005593103 puppet-user[67912]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:35 np0005593103 puppet-user[67912]: (file & line not available) Jan 23 09:10:35 np0005593103 puppet-user[67912]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:35 np0005593103 puppet-user[67912]: (file & line not available) Jan 23 09:10:36 np0005593103 puppet-user[67912]: Warning: Scope(Class[Swift::Proxy::S3token]): Usage of the default password is deprecated and will be removed in a future release. \ Jan 23 09:10:36 np0005593103 puppet-user[67912]: Please set password parameter Jan 23 09:10:36 np0005593103 puppet-user[67912]: Warning: Scope(Class[Swift::Keymaster]): password parameter is missing Jan 23 09:10:36 np0005593103 puppet-user[67912]: Warning: Scope(Class[Swift::Storage::All]): The default port for the object storage server has changed \ Jan 23 09:10:36 np0005593103 puppet-user[67912]: from 6000 to 6200 and will be changed in a later release Jan 23 09:10:36 np0005593103 puppet-user[67912]: Warning: Scope(Class[Swift::Storage::All]): The default port for the container storage server has changed \ Jan 23 09:10:36 np0005593103 puppet-user[67912]: from 6001 to 6201 and will be changed in a later release Jan 23 09:10:36 np0005593103 puppet-user[67912]: Warning: Scope(Class[Swift::Storage::All]): The default port for the account storage server has changed \ Jan 23 09:10:36 np0005593103 puppet-user[67912]: from 6002 to 6202 and will be changed in a later release Jan 23 09:10:36 np0005593103 puppet-user[67912]: Warning: Scope(Apache::Vhost[swift-proxy-api-proxy]): Jan 23 09:10:36 np0005593103 puppet-user[67912]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Jan 23 09:10:36 np0005593103 puppet-user[67912]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Jan 23 09:10:36 np0005593103 puppet-user[67912]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Jan 23 09:10:36 np0005593103 puppet-user[67912]: file names. Jan 23 09:10:36 np0005593103 puppet-user[67912]: Jan 23 09:10:36 np0005593103 puppet-user[67912]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Jan 23 09:10:36 np0005593103 puppet-user[67912]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Jan 23 09:10:36 np0005593103 puppet-user[67912]: sanitized $servername parameter when not explicitly defined. Jan 23 09:10:36 np0005593103 puppet-user[67912]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 1.22 seconds Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}bfbab458fa39f61c87cdb5ef3cce52ed613f259eef800a09a1adfa39c2c5ef56' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}872a9a603417127f1f034e076eb8af78dcdd7fb09b6df5c599b8609979637c33' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Rsync::Server/Concat[/etc/rsyncd.conf]/File[/etc/rsyncd.conf]/content: content changed '{sha256}189b30972178b755e8e70eab81b1d261c4def61b342300f11760e6f2e706ff64' to '{sha256}c5b164d0a9b819c87d935aa2ec255d882bc2edece6478aba3b5fba7bacd99410' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Rsync::Server/Service[rsyncd]/ensure: ensure changed 0 to 'running' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005593101.internalapi.ooo.test:11212,np0005593102.internalapi.ooo.test:11212,np0005593103.internalapi.ooo.test:11212 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/tls_enabled]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:proxy-logging/use]/value: value changed egg:swift#poxy_logging to egg:swift#proxy_logging Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[pipeline:main/pipeline]/value: value changed catch_errors proxy-logging cache proxy-server to catch_errors cache proxy-server Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/auto_create_account_prefix]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/concurrency]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/expiring_objects_account_name]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/interval]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/process]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/processes]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/reclaim_age]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/recon_cache_path]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/report_interval]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_facility]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_level]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to ZYnyHx5SV1KV0FNxclhRwlkQC Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/bind_ip]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/workers]/value: value changed 8 to 1 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_name]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_facility]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_level]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_headers]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_address]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[pipeline:main/pipeline]/value: value changed catch_errors gatekeeper healthcheck proxy-logging cache container_sync bulk tempurl ratelimit copy container-quotas account-quotas slo dlo versioned_writes proxy-logging proxy-server to catch_errors gatekeeper healthcheck proxy-logging cache listing_formats ratelimit bulk tempurl formpost authtoken s3api s3token keystone staticweb copy container_quotas account_quotas slo dlo versioned_writes proxy-logging proxy-server Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_name]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_facility]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_level]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_address]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/log_handoffs]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/object_chunk_size]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/client_chunk_size]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/allow_account_management]/value: value changed true to True Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/account_autocreate]/value: value changed true to True Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/max_containers_per_account]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/node_timeout]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/recoverable_node_timeout]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_name]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_facility]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_level]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_headers]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_address]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005593101.internalapi.ooo.test:11212,np0005593102.internalapi.ooo.test:11212,np0005593103.internalapi.ooo.test:11212 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/tls_enabled]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_max_connections]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Listing_formats/Swift_proxy_config[filter:listing_formats/use]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/clock_accuracy]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/max_sleep_time_seconds]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/log_sleep_time_seconds]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/rate_buffer_seconds]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/account_ratelimit]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_containers_per_extraction]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_failed_extractions]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_deletes_per_request]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/yield_frequency]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Formpost/Swift_proxy_config[filter:formpost/use]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/log_name]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/www_authenticate_uri]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_url]/value: value changed http://127.0.0.1:5000 to https://overcloud.internalapi.ooo.test:5000 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_type]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_domain_id]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/user_domain_id]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_name]/value: value changed %SERVICE_TENANT_NAME% to service Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/username]/value: value changed %SERVICE_USER% to swift Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/password]/value: value changed [old secret redacted] to [new secret redacted] Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/region_name]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/delay_auth_decision]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/cache]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/include_service_catalog]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/interface]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/use]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/auth_pipeline_check]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/use]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_uri]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/reseller_prefix]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/delay_auth_decision]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/secret_cache_duration]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_url]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_type]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/username]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/password]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_name]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Jan 23 09:10:37 np0005593103 puppet-user[68459]: (file: /etc/puppet/hiera.yaml) Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: Undefined variable '::deploy_config_name'; Jan 23 09:10:37 np0005593103 puppet-user[68459]: (file & line not available) Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_domain_id]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/user_domain_id]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/operator_roles]/value: value changed admin, SwiftOperator to admin, swiftoperator, ResellerAdmin Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/reseller_prefix]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/system_reader_roles]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/use]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/url_base]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Copy/Swift_proxy_config[filter:copy/object_post_as_copy]/value: value changed false to True Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Container_quotas/Swift_proxy_config[filter:container_quotas/use]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Account_quotas/Swift_proxy_config[filter:account_quotas/use]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_segments]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_size]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/min_segment_size]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_after_segment]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_segments_per_sec]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_get_time]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_after_segment]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Jan 23 09:10:37 np0005593103 puppet-user[68459]: (file & line not available) Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_segments_per_sec]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/max_get_time]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Versioned_writes/Swift_proxy_config[filter:versioned_writes/allow_versioned_writes]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/use]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/keymaster_config_path]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/use]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/disable_encryption]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/api_class]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/username]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_name]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_domain_id]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/user_domain_id]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/meta_version_to_write]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node/d1]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Storage::Account/Swift::Storage::Generic[account]/File[/etc/swift/account-server/]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Storage::Container/Swift::Storage::Generic[container]/File[/etc/swift/container-server/]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Storage::Object/Swift::Storage::Generic[object]/File[/etc/swift/object-server/]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6002]/Concat[/etc/swift/account-server.conf]/File[/etc/swift/account-server.conf]/ensure: defined content as '{sha256}c425dc1a3557dff51856e8dfa3150ddbf3c4d9fbf9af3af44077db6b3096c6c3' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6001]/Concat[/etc/swift/container-server.conf]/File[/etc/swift/container-server.conf]/ensure: defined content as '{sha256}56dc59297a840150603492e7684ddc18e526fb065aa512d3eb8d07431e2da61a' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6000]/Concat[/etc/swift/object-server.conf]/File[/etc/swift/object-server.conf]/ensure: defined content as '{sha256}efccc9f8da8344e5287955af9b8172164d6a5a7eff5026081d6a970082011262' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Proxy/Tripleo::Tls_proxy[swift-proxy-api]/Apache::Vhost[swift-proxy-api-proxy]/Concat[25-swift-proxy-api-proxy.conf]/File[/etc/httpd/conf.d/25-swift-proxy-api-proxy.conf]/ensure: defined content as '{sha256}b9979233fa625ff7ea2500138cbac032744a54efd637a07ba73a947d4773bc01' Jan 23 09:10:37 np0005593103 puppet-user[67912]: Notice: Applied catalog in 0.69 seconds Jan 23 09:10:37 np0005593103 puppet-user[67912]: Application: Jan 23 09:10:37 np0005593103 puppet-user[67912]: Initial environment: production Jan 23 09:10:37 np0005593103 puppet-user[67912]: Converged environment: production Jan 23 09:10:37 np0005593103 puppet-user[67912]: Run mode: user Jan 23 09:10:37 np0005593103 puppet-user[67912]: Changes: Jan 23 09:10:37 np0005593103 puppet-user[67912]: Total: 163 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Events: Jan 23 09:10:37 np0005593103 puppet-user[67912]: Success: 163 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Total: 163 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Resources: Jan 23 09:10:37 np0005593103 puppet-user[67912]: Changed: 163 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Out of sync: 163 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Skipped: 46 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Total: 330 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Time: Jan 23 09:10:37 np0005593103 puppet-user[67912]: Concat file: 0.00 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Swift config: 0.00 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Service: 0.00 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Concat fragment: 0.00 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Swift keymaster config: 0.01 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Swift object expirer config: 0.02 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Package: 0.03 Jan 23 09:10:37 np0005593103 puppet-user[67912]: File: 0.16 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Swift proxy config: 0.16 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Transaction evaluation: 0.68 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Catalog application: 0.69 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Config retrieval: 1.50 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Last run: 1769159437 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Resources: 0.00 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Total: 0.69 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Version: Jan 23 09:10:37 np0005593103 puppet-user[67912]: Config: 1769159435 Jan 23 09:10:37 np0005593103 puppet-user[67912]: Puppet: 7.10.0 Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Jan 23 09:10:37 np0005593103 puppet-user[68459]: Warning: validate_legacy(validate_re) expects an Integer value, got String at ["/etc/puppet/modules/swift/manifests/ringbuilder/rebalance.pp", 23]: Jan 23 09:10:37 np0005593103 puppet-user[68459]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Jan 23 09:10:37 np0005593103 puppet-user[68459]: Notice: Compiled catalog for np0005593103.ooo.test in environment production in 0.30 seconds Jan 23 09:10:37 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Jan 23 09:10:37 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Jan 23 09:10:37 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Jan 23 09:10:37 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to ZYnyHx5SV1KV0FNxclhRwlkQC Jan 23 09:10:37 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Jan 23 09:10:37 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Jan 23 09:10:38 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[object]/Exec[create_object]/returns: executed successfully Jan 23 09:10:38 np0005593103 systemd[1]: libpod-241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d.scope: Deactivated successfully. Jan 23 09:10:38 np0005593103 systemd[1]: libpod-241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d.scope: Consumed 4.685s CPU time. Jan 23 09:10:38 np0005593103 podman[68619]: 2026-01-23 09:10:38.542064505 +0000 UTC m=+0.066495174 container died 241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2025-11-19T00:12:50Z, architecture=x86_64, container_name=container-puppet-swift, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-swift-proxy-server, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, release=1761123044, io.buildah.version=1.41.4, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, distribution-scope=public, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-proxy-server-container, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server) Jan 23 09:10:38 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:38 np0005593103 systemd[1]: var-lib-containers-storage-overlay-0b093877e3a865ed87355f1994ec622bc3d7f907088915d5829f31dd86b106d8-merged.mount: Deactivated successfully. Jan 23 09:10:38 np0005593103 podman[68619]: 2026-01-23 09:10:38.600911806 +0000 UTC m=+0.125342415 container cleanup 241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, vcs-type=git, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., batch=17.1_20251118.1, com.redhat.component=openstack-swift-proxy-server-container, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, architecture=x86_64, io.buildah.version=1.41.4, container_name=container-puppet-swift, build-date=2025-11-19T00:12:50Z, url=https://www.redhat.com, version=17.1.12, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=) Jan 23 09:10:38 np0005593103 systemd[1]: libpod-conmon-241edf768ee09d1635ed19698722c41cf4700b08eb52152f07dd07c0474f9f1d.scope: Deactivated successfully. Jan 23 09:10:38 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift --conmon-pidfile /run/container-puppet-swift.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server --env NAME=swift --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::proxy#012#012class xinetd() {}#012define xinetd::service($bind='',$port='',$server='',$server_args='') {}#012noop_resource('service')#012include tripleo::profile::base::swift::storage --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 09:10:38 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[account]/Exec[create_account]/returns: executed successfully Jan 23 09:10:39 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[container]/Exec[create_container]/returns: executed successfully Jan 23 09:10:39 np0005593103 puppet-user[68459]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:39 np0005593103 puppet-user[68459]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:39 np0005593103 puppet-user[68459]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Jan 23 09:10:39 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_object_device[172.20.0.103:6000/d1]/ensure: created Jan 23 09:10:40 np0005593103 puppet-user[68459]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:40 np0005593103 puppet-user[68459]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:40 np0005593103 puppet-user[68459]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Jan 23 09:10:40 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_container_device[172.20.0.103:6001/d1]/ensure: created Jan 23 09:10:40 np0005593103 puppet-user[68459]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:40 np0005593103 puppet-user[68459]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:40 np0005593103 puppet-user[68459]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Jan 23 09:10:40 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_account_device[172.20.0.103:6002/d1]/ensure: created Jan 23 09:10:41 np0005593103 puppet-user[68459]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:41 np0005593103 puppet-user[68459]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:41 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_object_device[172.20.0.104:6000/d1]/ensure: created Jan 23 09:10:41 np0005593103 puppet-user[68459]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:41 np0005593103 puppet-user[68459]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:42 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_container_device[172.20.0.104:6001/d1]/ensure: created Jan 23 09:10:42 np0005593103 puppet-user[68459]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:42 np0005593103 puppet-user[68459]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:43 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_account_device[172.20.0.104:6002/d1]/ensure: created Jan 23 09:10:43 np0005593103 puppet-user[68459]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:43 np0005593103 puppet-user[68459]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:43 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_object_device[172.20.0.105:6000/d1]/ensure: created Jan 23 09:10:43 np0005593103 puppet-user[68459]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:43 np0005593103 puppet-user[68459]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:44 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_container_device[172.20.0.105:6001/d1]/ensure: created Jan 23 09:10:44 np0005593103 puppet-user[68459]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Jan 23 09:10:44 np0005593103 puppet-user[68459]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Jan 23 09:10:45 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_account_device[172.20.0.105:6002/d1]/ensure: created Jan 23 09:10:45 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[object]/Exec[rebalance_object]: Triggered 'refresh' from 3 events Jan 23 09:10:45 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[account]/Exec[rebalance_account]: Triggered 'refresh' from 3 events Jan 23 09:10:46 np0005593103 puppet-user[68459]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[container]/Exec[rebalance_container]: Triggered 'refresh' from 3 events Jan 23 09:10:46 np0005593103 puppet-user[68459]: Notice: Applied catalog in 8.19 seconds Jan 23 09:10:46 np0005593103 puppet-user[68459]: Application: Jan 23 09:10:46 np0005593103 puppet-user[68459]: Initial environment: production Jan 23 09:10:46 np0005593103 puppet-user[68459]: Converged environment: production Jan 23 09:10:46 np0005593103 puppet-user[68459]: Run mode: user Jan 23 09:10:46 np0005593103 puppet-user[68459]: Changes: Jan 23 09:10:46 np0005593103 puppet-user[68459]: Total: 21 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Events: Jan 23 09:10:46 np0005593103 puppet-user[68459]: Success: 21 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Total: 21 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Resources: Jan 23 09:10:46 np0005593103 puppet-user[68459]: Skipped: 16 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Changed: 21 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Out of sync: 21 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Restarted: 3 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Total: 38 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Time: Jan 23 09:10:46 np0005593103 puppet-user[68459]: File: 0.00 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Swift config: 0.01 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Config retrieval: 0.37 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Exec: 1.10 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Ring container device: 1.89 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Ring object device: 1.98 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Last run: 1769159446 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Ring account device: 2.05 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Transaction evaluation: 8.18 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Catalog application: 8.19 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Total: 8.19 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Version: Jan 23 09:10:46 np0005593103 puppet-user[68459]: Config: 1769159437 Jan 23 09:10:46 np0005593103 puppet-user[68459]: Puppet: 7.10.0 Jan 23 09:10:46 np0005593103 systemd[1]: libpod-ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f.scope: Deactivated successfully. Jan 23 09:10:46 np0005593103 systemd[1]: libpod-ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f.scope: Consumed 11.095s CPU time. Jan 23 09:10:46 np0005593103 podman[68402]: 2026-01-23 09:10:46.600290389 +0000 UTC m=+11.313489527 container died ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_puppet_step1, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-swift_ringbuilder, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-19T00:12:50Z, vcs-type=git, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, release=1761123044, io.buildah.version=1.41.4, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, com.redhat.component=openstack-swift-proxy-server-container, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, vendor=Red Hat, Inc.) Jan 23 09:10:46 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f-userdata-shm.mount: Deactivated successfully. Jan 23 09:10:46 np0005593103 systemd[1]: var-lib-containers-storage-overlay-a966ad57f894403a0e47a77e2fa5ddd146b16df02d4783c29c7f444c5ce293fd-merged.mount: Deactivated successfully. Jan 23 09:10:46 np0005593103 podman[68736]: 2026-01-23 09:10:46.721676847 +0000 UTC m=+0.111648190 container cleanup ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, vendor=Red Hat, Inc., managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, version=17.1.12, release=1761123044, tcib_managed=true, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder, distribution-scope=public, name=rhosp17/openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, batch=17.1_20251118.1, com.redhat.component=openstack-swift-proxy-server-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:12:50Z) Jan 23 09:10:46 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:46 np0005593103 systemd[1]: libpod-conmon-ebfecc55f5af69b86f73cfc911f928c8da461e890262dfcaad763bfc6929e89f.scope: Deactivated successfully. Jan 23 09:10:46 np0005593103 python3[62882]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift_ringbuilder --conmon-pidfile /run/container-puppet-swift_ringbuilder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005593103 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball --env NAME=swift_ringbuilder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::ringbuilder#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift_ringbuilder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005593103', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift_ringbuilder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Jan 23 09:10:47 np0005593103 python3[68792]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:48 np0005593103 python3[68824]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:10:49 np0005593103 python3[68874]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:49 np0005593103 python3[68917]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159448.9210365-173542-121242146240336/source dest=/usr/libexec/tripleo-container-shutdown mode=0700 owner=root group=root _original_basename=tripleo-container-shutdown follow=False checksum=7d67b1986212f5548057505748cd74cfcf9c0d35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:50 np0005593103 python3[68979]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:50 np0005593103 python3[69022]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159449.9105487-173542-56195426720269/source dest=/usr/libexec/tripleo-start-podman-container mode=0700 owner=root group=root _original_basename=tripleo-start-podman-container follow=False checksum=536965633b8d3b1ce794269ffb07be0105a560a0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:51 np0005593103 python3[69084]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:51 np0005593103 python3[69127]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159450.9808726-173602-48204258811588/source dest=/usr/lib/systemd/system/tripleo-container-shutdown.service mode=0644 owner=root group=root _original_basename=tripleo-container-shutdown-service follow=False checksum=66c1d41406ba8714feb9ed0a35259a7a57ef9707 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:52 np0005593103 python3[69189]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:52 np0005593103 python3[69232]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159452.0307899-173637-155743451613606/source dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset mode=0644 owner=root group=root _original_basename=91-tripleo-container-shutdown-preset follow=False checksum=bccb1207dcbcfaa5ca05f83c8f36ce4c2460f081 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:53 np0005593103 python3[69262]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:10:53 np0005593103 systemd[1]: Reloading. Jan 23 09:10:53 np0005593103 systemd-rc-local-generator[69285]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:10:53 np0005593103 systemd-sysv-generator[69291]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:10:53 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:10:53 np0005593103 systemd[1]: Reloading. Jan 23 09:10:53 np0005593103 systemd-sysv-generator[69332]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:10:53 np0005593103 systemd-rc-local-generator[69329]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:10:53 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:10:53 np0005593103 systemd[1]: Starting TripleO Container Shutdown... Jan 23 09:10:53 np0005593103 systemd[1]: Finished TripleO Container Shutdown. Jan 23 09:10:54 np0005593103 python3[69387]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:54 np0005593103 python3[69430]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159454.1390505-173820-50788171594555/source dest=/usr/lib/systemd/system/netns-placeholder.service mode=0644 owner=root group=root _original_basename=netns-placeholder-service follow=False checksum=8e9c6d5ce3a6e7f71c18780ec899f32f23de4c71 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:55 np0005593103 python3[69492]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 09:10:55 np0005593103 python3[69535]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159455.123457-173844-236435658354722/source dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset mode=0644 owner=root group=root _original_basename=91-netns-placeholder-preset follow=False checksum=28b7b9aa893525d134a1eeda8a0a48fb25b736b9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:10:56 np0005593103 python3[69565]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:10:56 np0005593103 systemd[1]: Reloading. Jan 23 09:10:56 np0005593103 systemd-rc-local-generator[69593]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:10:56 np0005593103 systemd-sysv-generator[69597]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:10:56 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:10:56 np0005593103 systemd[1]: Reloading. Jan 23 09:10:56 np0005593103 systemd-rc-local-generator[69633]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:10:56 np0005593103 systemd-sysv-generator[69636]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:10:56 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:10:57 np0005593103 systemd[1]: Starting Create netns directory... Jan 23 09:10:57 np0005593103 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Jan 23 09:10:57 np0005593103 systemd[1]: netns-placeholder.service: Deactivated successfully. Jan 23 09:10:57 np0005593103 systemd[1]: Finished Create netns directory. Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for memcached, new hash: 2e631a8a693ed18ad791fd5d2f59bb73 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for metrics_qdr, new hash: 972f55a7085b3a2f121c3e015c4b6025 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for mysql_bootstrap, new hash: 72e65ad23d7f3340f7324c969e65f8c6 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for rabbitmq_bootstrap, new hash: 68bef06e8e4fd2c55eb7553c068d9874 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for redis_tls_proxy, new hash: 7f9ceca5d453f87b58c630ee6f1f4e88 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for clustercheck, new hash: 9917f69d60d55f25aa4872c01ac3f102 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for horizon_fix_perms, new hash: c411395383f6ec23f8856075c90ec9b7 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for mysql_wait_bundle, new hash: 72e65ad23d7f3340f7324c969e65f8c6 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_db_sync, new hash: bf0ca2201388bb9c07203d2e12fc7f73 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for collectd, new hash: 169d2790228984e78165d0f5d54a4b6d Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_db_sync, new hash: 54df59ec71e1bd1593399cded76c22b9-3e5e22bb92cfdde1b4b56d1f3961c88d Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine_db_sync, new hash: 0894f0aedfcfabce745f353d70239e7f Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for horizon, new hash: c411395383f6ec23f8856075c90ec9b7 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for iscsid, new hash: 3e5e22bb92cfdde1b4b56d1f3961c88d Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for keystone, new hash: b366f43024f3ad3ebc292df0442a78c2 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for keystone_cron, new hash: b366f43024f3ad3ebc292df0442a78c2 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for keystone_db_sync, new hash: b366f43024f3ad3ebc292df0442a78c2 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_db_sync, new hash: bcfdf91c215f69bbf6cbabe0088f1a57 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for neutron_db_sync, new hash: 83bd1b029b50eea18aac1d6bcecf2e89 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_db_sync, new hash: 3930cdce66907f201c4541655c97a3dc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_ensure_default_cells, new hash: 3930cdce66907f201c4541655c97a3dc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_db_sync, new hash: 3930cdce66907f201c4541655c97a3dc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for placement_api_db_sync, new hash: 46c3bc1c24343dc9b4a31369f83a51ec Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for rsyslog, new hash: 7ad56334b8c3ee998f915cbbd10d5c47 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_copy_rings, new hash: c7232a6273de6d8125d7cd15e4064167-ca99129bc6fadc832c60d85da28814e5 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_central, new hash: 67aa1dee2148bfaadb38a9d30e9111a2 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_notification, new hash: 67aa1dee2148bfaadb38a9d30e9111a2 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api, new hash: bf0ca2201388bb9c07203d2e12fc7f73 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_cron, new hash: bf0ca2201388bb9c07203d2e12fc7f73 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for cinder_scheduler, new hash: bf0ca2201388bb9c07203d2e12fc7f73 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for glance_api, new hash: 54df59ec71e1bd1593399cded76c22b9-3e5e22bb92cfdde1b4b56d1f3961c88d Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_cron, new hash: 54df59ec71e1bd1593399cded76c22b9 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal, new hash: e87656e9e24efaa5c86f3bc1cf34dfdc-3e5e22bb92cfdde1b4b56d1f3961c88d Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal_tls_proxy, new hash: e87656e9e24efaa5c86f3bc1cf34dfdc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_tls_proxy, new hash: 54df59ec71e1bd1593399cded76c22b9 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for heat_api, new hash: 6386683cfc30fe781bcc31ae622ee54f Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cfn, new hash: e08ec71914b69c2842f4e6dcc3fcdef3 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cron, new hash: 6386683cfc30fe781bcc31ae622ee54f Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine, new hash: 0894f0aedfcfabce745f353d70239e7f Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for logrotate_crond, new hash: 53ed83bb0cae779ff95edb2002262c6f Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for manila_api, new hash: bcfdf91c215f69bbf6cbabe0088f1a57 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_cron, new hash: bcfdf91c215f69bbf6cbabe0088f1a57 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for manila_scheduler, new hash: bcfdf91c215f69bbf6cbabe0088f1a57 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for neutron_api, new hash: 83bd1b029b50eea18aac1d6bcecf2e89 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for neutron_server_tls_proxy, new hash: 83bd1b029b50eea18aac1d6bcecf2e89 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_api, new hash: 3930cdce66907f201c4541655c97a3dc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_cron, new hash: 3930cdce66907f201c4541655c97a3dc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_conductor, new hash: 3930cdce66907f201c4541655c97a3dc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_metadata, new hash: 3cf2938d42a83c98d2347c70394e421b Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_scheduler, new hash: 3930cdce66907f201c4541655c97a3dc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_vnc_proxy, new hash: 3930cdce66907f201c4541655c97a3dc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for nova_wait_for_api_service, new hash: 3930cdce66907f201c4541655c97a3dc Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for placement_api, new hash: 46c3bc1c24343dc9b4a31369f83a51ec Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for placement_wait_for_service, new hash: 46c3bc1c24343dc9b4a31369f83a51ec Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_auditor, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_reaper, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_replicator, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_server, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_auditor, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_replicator, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_server, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_updater, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_auditor, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_expirer, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_replicator, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_server, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_updater, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy_tls_proxy, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:57 np0005593103 python3[69659]: ansible-container_puppet_config [WARNING] Config change detected for swift_rsync, new hash: c7232a6273de6d8125d7cd15e4064167 Jan 23 09:10:58 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:58 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:59 np0005593103 python3[69718]: ansible-tripleo_container_manage Invoked with config_id=tripleo_step1 config_dir=/var/lib/tripleo-config/container-startup-config/step_1 config_patterns=*.json config_overrides={} concurrency=5 log_base_path=/var/log/containers/stdouts debug=False Jan 23 09:10:59 np0005593103 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 09:10:59 np0005593103 podman[69876]: 2026-01-23 09:10:59.661245111 +0000 UTC m=+0.085751188 container create af5c0c089010b16fd0a2ebc4432ac9f1c3b504437826eff30478ea1c310ab466 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.buildah.version=1.41.4, distribution-scope=public, batch=17.1_20251118.1, com.redhat.component=openstack-qdrouterd-container, url=https://www.redhat.com, name=rhosp17/openstack-qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=metrics_qdr_init_logs, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, build-date=2025-11-18T22:49:46Z, architecture=x86_64, vcs-type=git, maintainer=OpenStack TripleO Team, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, summary=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:59 np0005593103 podman[69901]: 2026-01-23 09:10:59.682399246 +0000 UTC m=+0.080948941 container create 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-memcached-container, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.expose-services=, url=https://www.redhat.com, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, container_name=memcached, vcs-type=git, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, build-date=2025-11-18T22:49:49Z, release=1761123044, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-memcached) Jan 23 09:10:59 np0005593103 systemd[1]: Started libpod-conmon-af5c0c089010b16fd0a2ebc4432ac9f1c3b504437826eff30478ea1c310ab466.scope. Jan 23 09:10:59 np0005593103 systemd[1]: Started libpod-conmon-57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58.scope. Jan 23 09:10:59 np0005593103 podman[69876]: 2026-01-23 09:10:59.619777034 +0000 UTC m=+0.044283141 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:10:59 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:59 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:59 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5dec5ac3c6316dbe458cc5866ec6800a0d1ab408a3cbb00784fe8706b868dbbd/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:59 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e5c46f5657c42377420fb35483d2491379a6f730f402a63c02855179971e09b9/merged/var/log/memcached supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:59 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e5c46f5657c42377420fb35483d2491379a6f730f402a63c02855179971e09b9/merged/var/lib/kolla/config_files/src supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:59 np0005593103 podman[69914]: 2026-01-23 09:10:59.728997489 +0000 UTC m=+0.110807537 container create 721adc81e9f57cdfa372ac5d1bf4d0daa5ac12efe84d7fc43800f72b5035f103 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, managed_by=tripleo_ansible, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=rabbitmq_bootstrap, config_id=tripleo_step1, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '68bef06e8e4fd2c55eb7553c068d9874'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, summary=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2025-11-18T22:49:50Z, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-rabbitmq, architecture=x86_64, distribution-scope=public, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, batch=17.1_20251118.1, vendor=Red Hat, Inc., vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-rabbitmq-container, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4) Jan 23 09:10:59 np0005593103 podman[69870]: 2026-01-23 09:10:59.632032072 +0000 UTC m=+0.055874072 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 09:10:59 np0005593103 podman[69901]: 2026-01-23 09:10:59.636786839 +0000 UTC m=+0.035336544 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 09:10:59 np0005593103 podman[69918]: 2026-01-23 09:10:59.74477725 +0000 UTC m=+0.113280363 container create 2ee55827acdb2eaec1ed023cece3ea8c653e4c535241c51760503f7d1b9bcea0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:51:13Z, io.buildah.version=1.41.4, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_step1, name=rhosp17/openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, url=https://www.redhat.com, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, maintainer=OpenStack TripleO Team, distribution-scope=public, version=17.1.12, io.openshift.expose-services=, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, container_name=mysql_data_ownership, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Jan 23 09:10:59 np0005593103 systemd[1]: Started /usr/bin/podman healthcheck run 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58. Jan 23 09:10:59 np0005593103 podman[69901]: 2026-01-23 09:10:59.751812448 +0000 UTC m=+0.150362153 container init 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, distribution-scope=public, vendor=Red Hat, Inc., version=17.1.12, summary=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20251118.1, tcib_managed=true, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:49Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=memcached, managed_by=tripleo_ansible, com.redhat.component=openstack-memcached-container, name=rhosp17/openstack-memcached, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}) Jan 23 09:10:59 np0005593103 podman[69914]: 2026-01-23 09:10:59.653445833 +0000 UTC m=+0.035255881 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Jan 23 09:10:59 np0005593103 systemd[1]: Started libpod-conmon-2ee55827acdb2eaec1ed023cece3ea8c653e4c535241c51760503f7d1b9bcea0.scope. Jan 23 09:10:59 np0005593103 podman[69918]: 2026-01-23 09:10:59.678928684 +0000 UTC m=+0.047431847 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:10:59 np0005593103 systemd[1]: Started /usr/bin/podman healthcheck run 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58. Jan 23 09:10:59 np0005593103 podman[69876]: 2026-01-23 09:10:59.784598523 +0000 UTC m=+0.209104600 container init af5c0c089010b16fd0a2ebc4432ac9f1c3b504437826eff30478ea1c310ab466 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_step1, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:46Z, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, batch=17.1_20251118.1, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, release=1761123044, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, vendor=Red Hat, Inc., architecture=x86_64, io.buildah.version=1.41.4, url=https://www.redhat.com, container_name=metrics_qdr_init_logs, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-qdrouterd-container) Jan 23 09:10:59 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:59 np0005593103 podman[69876]: 2026-01-23 09:10:59.793559382 +0000 UTC m=+0.218065449 container start af5c0c089010b16fd0a2ebc4432ac9f1c3b504437826eff30478ea1c310ab466 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, container_name=metrics_qdr_init_logs, io.buildah.version=1.41.4, batch=17.1_20251118.1, com.redhat.component=openstack-qdrouterd-container, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_step1, distribution-scope=public, vcs-type=git, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, name=rhosp17/openstack-qdrouterd, build-date=2025-11-18T22:49:46Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12) Jan 23 09:10:59 np0005593103 podman[69876]: 2026-01-23 09:10:59.79382882 +0000 UTC m=+0.218334907 container attach af5c0c089010b16fd0a2ebc4432ac9f1c3b504437826eff30478ea1c310ab466 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, name=rhosp17/openstack-qdrouterd, vendor=Red Hat, Inc., io.openshift.expose-services=, release=1761123044, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, url=https://www.redhat.com, architecture=x86_64, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, config_id=tripleo_step1, vcs-type=git, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, build-date=2025-11-18T22:49:46Z, summary=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr_init_logs, version=17.1.12, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1) Jan 23 09:10:59 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/1947dae2b84070c360c06e244465a6d59fa3d8d135ccc7c7fd9d912a0e1408cd/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:59 np0005593103 podman[69870]: 2026-01-23 09:10:59.796539282 +0000 UTC m=+0.220381272 container create 8f5eaeb2913381972e6fb59ff69d87e229403eab5f993943ec054b19ac9650d8 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, version=17.1.12, release=1761123044, batch=17.1_20251118.1, url=https://www.redhat.com, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f9ceca5d453f87b58c630ee6f1f4e88'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.4, container_name=redis_tls_proxy, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:49Z, distribution-scope=public, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, managed_by=tripleo_ansible, name=rhosp17/openstack-redis, com.redhat.component=openstack-redis-container, io.openshift.expose-services=) Jan 23 09:10:59 np0005593103 podman[69918]: 2026-01-23 09:10:59.799407598 +0000 UTC m=+0.167910711 container init 2ee55827acdb2eaec1ed023cece3ea8c653e4c535241c51760503f7d1b9bcea0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, io.buildah.version=1.41.4, version=17.1.12, name=rhosp17/openstack-mariadb, container_name=mysql_data_ownership, com.redhat.component=openstack-mariadb-container, tcib_managed=true, io.openshift.expose-services=, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, release=1761123044, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, build-date=2025-11-18T22:51:13Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, architecture=x86_64) Jan 23 09:10:59 np0005593103 systemd[1]: libpod-af5c0c089010b16fd0a2ebc4432ac9f1c3b504437826eff30478ea1c310ab466.scope: Deactivated successfully. Jan 23 09:10:59 np0005593103 systemd[1]: Started libpod-conmon-721adc81e9f57cdfa372ac5d1bf4d0daa5ac12efe84d7fc43800f72b5035f103.scope. Jan 23 09:10:59 np0005593103 systemd[1]: libpod-2ee55827acdb2eaec1ed023cece3ea8c653e4c535241c51760503f7d1b9bcea0.scope: Deactivated successfully. Jan 23 09:10:59 np0005593103 systemd[1]: Started libpod-conmon-8f5eaeb2913381972e6fb59ff69d87e229403eab5f993943ec054b19ac9650d8.scope. Jan 23 09:10:59 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:59 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c95a4f544d3ef83004e198c7b441b5767ff63773b05d2d77b59cba5553108ebb/merged/var/lib/rabbitmq supports timestamps until 2038 (0x7fffffff) Jan 23 09:10:59 np0005593103 podman[69901]: 2026-01-23 09:10:59.838778429 +0000 UTC m=+0.237328124 container start 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, build-date=2025-11-18T22:49:49Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=memcached, vendor=Red Hat, Inc., com.redhat.component=openstack-memcached-container, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, summary=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, version=17.1.12, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, batch=17.1_20251118.1) Jan 23 09:10:59 np0005593103 python3[69718]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name memcached --conmon-pidfile /run/memcached.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2e631a8a693ed18ad791fd5d2f59bb73 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=memcached --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/memcached.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z --volume /var/log/containers/memcached:/var/log/memcached:rw --volume /etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro --volume /etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Jan 23 09:10:59 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:10:59 np0005593103 podman[69914]: 2026-01-23 09:10:59.854402535 +0000 UTC m=+0.236212573 container init 721adc81e9f57cdfa372ac5d1bf4d0daa5ac12efe84d7fc43800f72b5035f103 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20251118.1, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:50Z, config_id=tripleo_step1, tcib_managed=true, com.redhat.component=openstack-rabbitmq-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 rabbitmq, release=1761123044, vcs-type=git, name=rhosp17/openstack-rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=rabbitmq_bootstrap, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.expose-services=, url=https://www.redhat.com, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '68bef06e8e4fd2c55eb7553c068d9874'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 rabbitmq) Jan 23 09:10:59 np0005593103 podman[69918]: 2026-01-23 09:10:59.85644047 +0000 UTC m=+0.224943593 container start 2ee55827acdb2eaec1ed023cece3ea8c653e4c535241c51760503f7d1b9bcea0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, io.openshift.expose-services=, architecture=x86_64, name=rhosp17/openstack-mariadb, managed_by=tripleo_ansible, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, com.redhat.component=openstack-mariadb-container, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, io.buildah.version=1.41.4, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, distribution-scope=public, vendor=Red Hat, Inc., container_name=mysql_data_ownership, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:59 np0005593103 podman[69918]: 2026-01-23 09:10:59.856715847 +0000 UTC m=+0.225218960 container attach 2ee55827acdb2eaec1ed023cece3ea8c653e4c535241c51760503f7d1b9bcea0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, container_name=mysql_data_ownership, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, config_id=tripleo_step1, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, architecture=x86_64, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, name=rhosp17/openstack-mariadb, managed_by=tripleo_ansible) Jan 23 09:10:59 np0005593103 podman[69918]: 2026-01-23 09:10:59.858107645 +0000 UTC m=+0.226610758 container died 2ee55827acdb2eaec1ed023cece3ea8c653e4c535241c51760503f7d1b9bcea0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, vcs-type=git, tcib_managed=true, config_id=tripleo_step1, container_name=mysql_data_ownership, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, url=https://www.redhat.com, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, maintainer=OpenStack TripleO Team, distribution-scope=public) Jan 23 09:10:59 np0005593103 podman[69914]: 2026-01-23 09:10:59.862759198 +0000 UTC m=+0.244569226 container start 721adc81e9f57cdfa372ac5d1bf4d0daa5ac12efe84d7fc43800f72b5035f103 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, distribution-scope=public, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vendor=Red Hat, Inc., com.redhat.component=openstack-rabbitmq-container, vcs-type=git, url=https://www.redhat.com, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp17/openstack-rabbitmq, container_name=rabbitmq_bootstrap, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 rabbitmq, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:50Z, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.4, batch=17.1_20251118.1, config_id=tripleo_step1, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '68bef06e8e4fd2c55eb7553c068d9874'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:10:59 np0005593103 podman[69870]: 2026-01-23 09:10:59.866253941 +0000 UTC m=+0.290095971 container init 8f5eaeb2913381972e6fb59ff69d87e229403eab5f993943ec054b19ac9650d8 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f9ceca5d453f87b58c630ee6f1f4e88'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, architecture=x86_64, io.openshift.expose-services=, container_name=redis_tls_proxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, tcib_managed=true, com.redhat.component=openstack-redis-container, vcs-type=git, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, managed_by=tripleo_ansible, release=1761123044, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:49:49Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-redis, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:10:59 np0005593103 python3[69718]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name rabbitmq_bootstrap --conmon-pidfile /run/rabbitmq_bootstrap.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1769154735 --env TRIPLEO_CONFIG_HASH=68bef06e8e4fd2c55eb7553c068d9874 --label config_id=tripleo_step1 --label container_name=rabbitmq_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '68bef06e8e4fd2c55eb7553c068d9874'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/rabbitmq_bootstrap.log --network host --privileged=False --user root --volume /var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /var/lib/rabbitmq:/var/lib/rabbitmq:z --volume /etc/puppet:/etc/puppet:ro,z registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 bash -ec kolla_set_configs#012if [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi#012hiera 'rabbitmq::erlang_cookie' > /var/lib/rabbitmq/.erlang.cookie#012chown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie#012chmod 400 /var/lib/rabbitmq/.erlang.cookie Jan 23 09:10:59 np0005593103 podman[69870]: 2026-01-23 09:10:59.875833318 +0000 UTC m=+0.299675318 container start 8f5eaeb2913381972e6fb59ff69d87e229403eab5f993943ec054b19ac9650d8 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, release=1761123044, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, config_id=tripleo_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-redis, container_name=redis_tls_proxy, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f9ceca5d453f87b58c630ee6f1f4e88'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, tcib_managed=true, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:49:49Z, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 redis) Jan 23 09:10:59 np0005593103 python3[69718]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name redis_tls_proxy --conmon-pidfile /run/redis_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=7f9ceca5d453f87b58c630ee6f1f4e88 --label config_id=tripleo_step1 --label container_name=redis_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f9ceca5d453f87b58c630ee6f1f4e88'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/redis_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro --volume /etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro --volume /var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Jan 23 09:10:59 np0005593103 podman[69876]: 2026-01-23 09:10:59.90481102 +0000 UTC m=+0.329317097 container died af5c0c089010b16fd0a2ebc4432ac9f1c3b504437826eff30478ea1c310ab466 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, tcib_managed=true, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, url=https://www.redhat.com, config_id=tripleo_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, release=1761123044, vcs-type=git, version=17.1.12, build-date=2025-11-18T22:49:46Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-qdrouterd, container_name=metrics_qdr_init_logs, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Jan 23 09:10:59 np0005593103 podman[69970]: 2026-01-23 09:10:59.987340343 +0000 UTC m=+0.188189812 container health_status 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=starting, vcs-type=git, com.redhat.component=openstack-memcached-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, io.buildah.version=1.41.4, build-date=2025-11-18T22:49:49Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-memcached, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, batch=17.1_20251118.1, container_name=memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.12, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.openshift.expose-services=, vendor=Red Hat, Inc.) Jan 23 09:11:00 np0005593103 podman[69988]: 2026-01-23 09:11:00.002133418 +0000 UTC m=+0.174434676 container cleanup 2ee55827acdb2eaec1ed023cece3ea8c653e4c535241c51760503f7d1b9bcea0 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, url=https://www.redhat.com, vcs-type=git, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, com.redhat.component=openstack-mariadb-container, version=17.1.12, distribution-scope=public, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, container_name=mysql_data_ownership, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:51:13Z, vendor=Red Hat, Inc., io.buildah.version=1.41.4, managed_by=tripleo_ansible, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Jan 23 09:11:00 np0005593103 systemd[1]: libpod-721adc81e9f57cdfa372ac5d1bf4d0daa5ac12efe84d7fc43800f72b5035f103.scope: Deactivated successfully. Jan 23 09:11:00 np0005593103 systemd[1]: libpod-conmon-2ee55827acdb2eaec1ed023cece3ea8c653e4c535241c51760503f7d1b9bcea0.scope: Deactivated successfully. Jan 23 09:11:00 np0005593103 python3[69718]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_data_ownership --conmon-pidfile /run/mysql_data_ownership.pid --detach=False --label config_id=tripleo_step1 --label container_name=mysql_data_ownership --label managed_by=tripleo_ansible --label config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_data_ownership.log --network host --user root --volume /var/lib/mysql:/var/lib/mysql:z registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 chown -R mysql: /var/lib/mysql Jan 23 09:11:00 np0005593103 podman[70104]: 2026-01-23 09:11:00.063123675 +0000 UTC m=+0.043690657 container died 721adc81e9f57cdfa372ac5d1bf4d0daa5ac12efe84d7fc43800f72b5035f103 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, io.openshift.expose-services=, vcs-type=git, container_name=rabbitmq_bootstrap, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, config_id=tripleo_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '68bef06e8e4fd2c55eb7553c068d9874'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:50Z, url=https://www.redhat.com, name=rhosp17/openstack-rabbitmq, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1) Jan 23 09:11:00 np0005593103 podman[69970]: 2026-01-23 09:11:00.088376239 +0000 UTC m=+0.289225728 container exec_died 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, name=rhosp17/openstack-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, vendor=Red Hat, Inc., version=17.1.12, com.redhat.component=openstack-memcached-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, release=1761123044, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, container_name=memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, vcs-type=git) Jan 23 09:11:00 np0005593103 systemd[1]: 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58.service: Deactivated successfully. Jan 23 09:11:00 np0005593103 podman[69982]: 2026-01-23 09:11:00.184488203 +0000 UTC m=+0.370659931 container cleanup af5c0c089010b16fd0a2ebc4432ac9f1c3b504437826eff30478ea1c310ab466 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, vcs-type=git, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, com.redhat.component=openstack-qdrouterd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., io.buildah.version=1.41.4, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, version=17.1.12, distribution-scope=public, container_name=metrics_qdr_init_logs, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, name=rhosp17/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:46Z, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com) Jan 23 09:11:00 np0005593103 python3[69718]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr_init_logs --conmon-pidfile /run/metrics_qdr_init_logs.pid --detach=False --label config_id=tripleo_step1 --label container_name=metrics_qdr_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 /bin/bash -c chown -R qdrouterd:qdrouterd /var/log/qdrouterd Jan 23 09:11:00 np0005593103 systemd[1]: libpod-conmon-af5c0c089010b16fd0a2ebc4432ac9f1c3b504437826eff30478ea1c310ab466.scope: Deactivated successfully. Jan 23 09:11:00 np0005593103 podman[70104]: 2026-01-23 09:11:00.234612501 +0000 UTC m=+0.215179463 container cleanup 721adc81e9f57cdfa372ac5d1bf4d0daa5ac12efe84d7fc43800f72b5035f103 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, architecture=x86_64, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, release=1761123044, description=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, name=rhosp17/openstack-rabbitmq, vendor=Red Hat, Inc., com.redhat.component=openstack-rabbitmq-container, io.buildah.version=1.41.4, vcs-type=git, tcib_managed=true, build-date=2025-11-18T22:49:50Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735', 'TRIPLEO_CONFIG_HASH': '68bef06e8e4fd2c55eb7553c068d9874'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.12, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=rabbitmq_bootstrap, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 rabbitmq) Jan 23 09:11:00 np0005593103 systemd[1]: libpod-conmon-721adc81e9f57cdfa372ac5d1bf4d0daa5ac12efe84d7fc43800f72b5035f103.scope: Deactivated successfully. Jan 23 09:11:00 np0005593103 podman[70269]: 2026-01-23 09:11:00.679187064 +0000 UTC m=+0.087689362 container create 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, name=rhosp17/openstack-qdrouterd, com.redhat.component=openstack-qdrouterd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, config_id=tripleo_step1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, architecture=x86_64, io.openshift.expose-services=, container_name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '972f55a7085b3a2f121c3e015c4b6025'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, vcs-type=git, build-date=2025-11-18T22:49:46Z, version=17.1.12, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, distribution-scope=public, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, maintainer=OpenStack TripleO Team) Jan 23 09:11:00 np0005593103 podman[70270]: 2026-01-23 09:11:00.714392543 +0000 UTC m=+0.111421634 container create 9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, distribution-scope=public, release=1761123044, name=rhosp17/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20251118.1, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_step1, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '72e65ad23d7f3340f7324c969e65f8c6'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=mysql_bootstrap, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, build-date=2025-11-18T22:51:13Z, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vendor=Red Hat, Inc., com.redhat.component=openstack-mariadb-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Jan 23 09:11:00 np0005593103 podman[70269]: 2026-01-23 09:11:00.632726304 +0000 UTC m=+0.041228642 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:11:00 np0005593103 systemd[1]: Started libpod-conmon-88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e.scope. Jan 23 09:11:00 np0005593103 podman[70270]: 2026-01-23 09:11:00.649602424 +0000 UTC m=+0.046631545 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Jan 23 09:11:00 np0005593103 systemd[1]: Started libpod-conmon-9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae.scope. Jan 23 09:11:00 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:11:00 np0005593103 systemd[1]: Started libcrun container. Jan 23 09:11:00 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b4373ab4f8f93ad4fa57d94ffcdaf4241621134020f0e3ebec77558ba39fbb18/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Jan 23 09:11:00 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b4373ab4f8f93ad4fa57d94ffcdaf4241621134020f0e3ebec77558ba39fbb18/merged/var/lib/qdrouterd supports timestamps until 2038 (0x7fffffff) Jan 23 09:11:00 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d74ff02850920131827eb9d7f580abc2984df68dbb7e39c2cd7d6059462bbc03/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Jan 23 09:11:00 np0005593103 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d74ff02850920131827eb9d7f580abc2984df68dbb7e39c2cd7d6059462bbc03/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Jan 23 09:11:00 np0005593103 systemd[1]: Started /usr/bin/podman healthcheck run 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e. Jan 23 09:11:00 np0005593103 podman[70269]: 2026-01-23 09:11:00.803942932 +0000 UTC m=+0.212445260 container init 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, io.buildah.version=1.41.4, url=https://www.redhat.com, config_id=tripleo_step1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, container_name=metrics_qdr, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, version=17.1.12, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-11-18T22:49:46Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, name=rhosp17/openstack-qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '972f55a7085b3a2f121c3e015c4b6025'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc.) Jan 23 09:11:00 np0005593103 podman[70270]: 2026-01-23 09:11:00.829901565 +0000 UTC m=+0.226930656 container init 9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, container_name=mysql_bootstrap, managed_by=tripleo_ansible, com.redhat.component=openstack-mariadb-container, vcs-type=git, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '72e65ad23d7f3340f7324c969e65f8c6'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, tcib_managed=true, build-date=2025-11-18T22:51:13Z, summary=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, release=1761123044, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_id=tripleo_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., name=rhosp17/openstack-mariadb, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12) Jan 23 09:11:00 np0005593103 systemd[1]: Started /usr/bin/podman healthcheck run 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e. Jan 23 09:11:00 np0005593103 podman[70269]: 2026-01-23 09:11:00.845628685 +0000 UTC m=+0.254131003 container start 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, managed_by=tripleo_ansible, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:46Z, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '972f55a7085b3a2f121c3e015c4b6025'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, version=17.1.12, io.openshift.expose-services=, tcib_managed=true, container_name=metrics_qdr, architecture=x86_64, distribution-scope=public, name=rhosp17/openstack-qdrouterd, url=https://www.redhat.com) Jan 23 09:11:00 np0005593103 podman[70270]: 2026-01-23 09:11:00.849113938 +0000 UTC m=+0.246143039 container start 9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, tcib_managed=true, build-date=2025-11-18T22:51:13Z, com.redhat.component=openstack-mariadb-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, batch=17.1_20251118.1, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, version=17.1.12, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '72e65ad23d7f3340f7324c969e65f8c6'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, distribution-scope=public, container_name=mysql_bootstrap, name=rhosp17/openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc.) Jan 23 09:11:00 np0005593103 podman[70270]: 2026-01-23 09:11:00.84956182 +0000 UTC m=+0.246590881 container attach 9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, managed_by=tripleo_ansible, version=17.1.12, url=https://www.redhat.com, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, name=rhosp17/openstack-mariadb, com.redhat.component=openstack-mariadb-container, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '72e65ad23d7f3340f7324c969e65f8c6'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, architecture=x86_64, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=mysql_bootstrap, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, batch=17.1_20251118.1, build-date=2025-11-18T22:51:13Z) Jan 23 09:11:00 np0005593103 python3[69718]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr --conmon-pidfile /run/metrics_qdr.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=972f55a7085b3a2f121c3e015c4b6025 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=metrics_qdr --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '972f55a7085b3a2f121c3e015c4b6025'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr.log --network host --privileged=False --user qdrouterd --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro --volume /var/lib/metrics_qdr:/var/lib/qdrouterd:z --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z --volume /etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro --volume /etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Jan 23 09:11:00 np0005593103 podman[70308]: 2026-01-23 09:11:00.996990654 +0000 UTC m=+0.143665835 container health_status 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=starting, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=metrics_qdr, vcs-type=git, build-date=2025-11-18T22:49:46Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-qdrouterd-container, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '972f55a7085b3a2f121c3e015c4b6025'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, summary=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, tcib_managed=true, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, release=1761123044, io.buildah.version=1.41.4) Jan 23 09:11:01 np0005593103 podman[70308]: 2026-01-23 09:11:01.236593128 +0000 UTC m=+0.383237758 container exec_died 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, container_name=metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, config_id=tripleo_step1, version=17.1.12, architecture=x86_64, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '972f55a7085b3a2f121c3e015c4b6025'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, build-date=2025-11-18T22:49:46Z, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-qdrouterd, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., url=https://www.redhat.com, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1) Jan 23 09:11:01 np0005593103 systemd[1]: 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e.service: Deactivated successfully. Jan 23 09:11:06 np0005593103 systemd[1]: libpod-9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae.scope: Deactivated successfully. Jan 23 09:11:06 np0005593103 systemd[1]: libpod-9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae.scope: Consumed 2.822s CPU time. Jan 23 09:11:07 np0005593103 podman[70270]: 2026-01-23 09:11:07.002671664 +0000 UTC m=+6.399700765 container died 9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, vcs-type=git, name=rhosp17/openstack-mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, vendor=Red Hat, Inc., version=17.1.12, build-date=2025-11-18T22:51:13Z, managed_by=tripleo_ansible, tcib_managed=true, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, container_name=mysql_bootstrap, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '72e65ad23d7f3340f7324c969e65f8c6'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, io.buildah.version=1.41.4, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, architecture=x86_64) Jan 23 09:11:07 np0005593103 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae-userdata-shm.mount: Deactivated successfully. Jan 23 09:11:07 np0005593103 systemd[1]: var-lib-containers-storage-overlay-d74ff02850920131827eb9d7f580abc2984df68dbb7e39c2cd7d6059462bbc03-merged.mount: Deactivated successfully. Jan 23 09:11:07 np0005593103 podman[71099]: 2026-01-23 09:11:07.123575862 +0000 UTC m=+0.107182032 container cleanup 9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, batch=17.1_20251118.1, config_id=tripleo_step1, io.buildah.version=1.41.4, com.redhat.component=openstack-mariadb-container, release=1761123044, name=rhosp17/openstack-mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:51:13Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_bootstrap, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '72e65ad23d7f3340f7324c969e65f8c6'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.openshift.expose-services=, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, version=17.1.12, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb) Jan 23 09:11:07 np0005593103 systemd[1]: libpod-conmon-9a34fb73faa362d11b81d7272822e9668c25ba97c8e3f1f3cafa47aaba90bdae.scope: Deactivated successfully. Jan 23 09:11:07 np0005593103 python3[69718]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_bootstrap --conmon-pidfile /run/mysql_bootstrap.pid --detach=False --env DB_MARIABACKUP_PASSWORD=8vXb4IKKnGGsuu5CBm6O5o27n --env DB_MARIABACKUP_USER=mariabackup --env DB_MAX_TIMEOUT=60 --env KOLLA_BOOTSTRAP=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=72e65ad23d7f3340f7324c969e65f8c6 --label config_id=tripleo_step1 --label container_name=mysql_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '72e65ad23d7f3340f7324c969e65f8c6'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_bootstrap.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z --volume /var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z --volume /var/lib/mysql:/var/lib/mysql:rw,z --volume /etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro --volume /etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 bash -ec if [ -e /var/lib/mysql/mysql ]; then exit 0; fi#012echo -e "\n[mysqld]\nwsrep_provider=none" >> /etc/my.cnf#012export DB_ROOT_PASSWORD=$(hiera 'mysql::server::root_password')#012kolla_set_configs#012sudo -u mysql -E kolla_extend_start#012timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done'#012mysqld_safe --skip-networking --wsrep-on=OFF timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'until mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" ping 2>/dev/null; do sleep 1; done'#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "CREATE USER 'clustercheck'@'localhost' IDENTIFIED BY '$(hiera mysql_clustercheck_password)';"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "GRANT PROCESS ON *.* TO 'clustercheck'@'localhost' WITH GRANT OPTION;"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "DELETE FROM mysql.user WHERE user = 'root' AND host NOT IN ('%','localhost');"#012timeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" shutdown Jan 23 09:11:07 np0005593103 python3[71153]: ansible-file Invoked with path=/etc/systemd/system/tripleo_memcached.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:08 np0005593103 python3[71169]: ansible-file Invoked with path=/etc/systemd/system/tripleo_metrics_qdr.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:08 np0005593103 python3[71185]: ansible-file Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:08 np0005593103 python3[71201]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_memcached_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:11:08 np0005593103 python3[71217]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_metrics_qdr_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:11:09 np0005593103 python3[71233]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 09:11:09 np0005593103 python3[71294]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159469.3164775-174214-101835832796363/source dest=/etc/systemd/system/tripleo_memcached.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:10 np0005593103 python3[71323]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159469.3164775-174214-101835832796363/source dest=/etc/systemd/system/tripleo_metrics_qdr.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:11 np0005593103 python3[71352]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769159469.3164775-174214-101835832796363/source dest=/etc/systemd/system/tripleo_redis_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:11 np0005593103 python3[71368]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Jan 23 09:11:11 np0005593103 systemd[1]: Reloading. Jan 23 09:11:11 np0005593103 systemd-sysv-generator[71396]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:11:11 np0005593103 systemd-rc-local-generator[71390]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:11:11 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:11:12 np0005593103 python3[71419]: ansible-systemd Invoked with state=restarted name=tripleo_memcached.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:11:12 np0005593103 systemd[1]: Reloading. Jan 23 09:11:12 np0005593103 systemd-rc-local-generator[71449]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:11:12 np0005593103 systemd-sysv-generator[71452]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:11:12 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:11:12 np0005593103 systemd[1]: Starting memcached container... Jan 23 09:11:13 np0005593103 systemd[1]: Started memcached container. Jan 23 09:11:13 np0005593103 python3[71487]: ansible-systemd Invoked with state=restarted name=tripleo_metrics_qdr.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:11:13 np0005593103 systemd[1]: Reloading. Jan 23 09:11:14 np0005593103 systemd-rc-local-generator[71517]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:11:14 np0005593103 systemd-sysv-generator[71520]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:11:14 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:11:15 np0005593103 systemd[1]: Starting metrics_qdr container... Jan 23 09:11:15 np0005593103 systemd[1]: Started metrics_qdr container. Jan 23 09:11:15 np0005593103 python3[71556]: ansible-systemd Invoked with state=restarted name=tripleo_redis_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 09:11:16 np0005593103 systemd[1]: Reloading. Jan 23 09:11:16 np0005593103 systemd-rc-local-generator[71580]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 09:11:16 np0005593103 systemd-sysv-generator[71584]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 09:11:16 np0005593103 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 09:11:16 np0005593103 systemd[1]: Starting redis_tls_proxy container... Jan 23 09:11:16 np0005593103 systemd[1]: Started redis_tls_proxy container. Jan 23 09:11:16 np0005593103 python3[71636]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks1.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:18 np0005593103 python3[71757]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks1.json short_hostname=np0005593103 step=1 update_config_hash_only=False Jan 23 09:11:19 np0005593103 python3[71773]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 09:11:19 np0005593103 python3[71789]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Jan 23 09:11:28 np0005593103 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:7b:60:86 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.132 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=58315 DF PROTO=TCP SPT=48738 DPT=19885 SEQ=804295035 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080AF48C308A0000000001030307) Jan 23 09:11:28 np0005593103 sshd[71790]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:28 np0005593103 systemd[1]: Starting User Manager for UID 1000... Jan 23 09:11:28 np0005593103 systemd-logind[36446]: New session 17 of user zuul. Jan 23 09:11:28 np0005593103 systemd[71794]: Queued start job for default target Main User Target. Jan 23 09:11:28 np0005593103 systemd[71794]: Created slice User Application Slice. Jan 23 09:11:28 np0005593103 systemd[71794]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 09:11:28 np0005593103 systemd[71794]: Started Daily Cleanup of User's Temporary Directories. Jan 23 09:11:28 np0005593103 systemd[71794]: Reached target Paths. Jan 23 09:11:28 np0005593103 systemd[71794]: Reached target Timers. Jan 23 09:11:28 np0005593103 systemd[71794]: Starting D-Bus User Message Bus Socket... Jan 23 09:11:28 np0005593103 systemd[71794]: Starting Create User's Volatile Files and Directories... Jan 23 09:11:28 np0005593103 systemd[71794]: Listening on D-Bus User Message Bus Socket. Jan 23 09:11:28 np0005593103 systemd[71794]: Reached target Sockets. Jan 23 09:11:28 np0005593103 systemd[71794]: Finished Create User's Volatile Files and Directories. Jan 23 09:11:28 np0005593103 systemd[71794]: Reached target Basic System. Jan 23 09:11:28 np0005593103 systemd[71794]: Reached target Main User Target. Jan 23 09:11:28 np0005593103 systemd[71794]: Startup finished in 134ms. Jan 23 09:11:28 np0005593103 systemd[1]: Started User Manager for UID 1000. Jan 23 09:11:28 np0005593103 systemd[1]: Started Session 17 of User zuul. Jan 23 09:11:28 np0005593103 python3[71825]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-8619-8585-00000000000c-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 09:11:29 np0005593103 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:7b:60:86 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.132 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=58316 DF PROTO=TCP SPT=48738 DPT=19885 SEQ=804295035 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080AF48C34910000000001030307) Jan 23 09:11:29 np0005593103 subscription-manager[71826]: Unregistered machine with identity: 23fed67b-eb77-454b-94cb-5ed48a526b11 Jan 23 09:11:30 np0005593103 systemd[1]: Started /usr/bin/podman healthcheck run 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58. Jan 23 09:11:30 np0005593103 podman[71828]: 2026-01-23 09:11:30.49627617 +0000 UTC m=+0.099144406 container health_status 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, config_id=tripleo_step1, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-memcached, architecture=x86_64, container_name=memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, description=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.4) Jan 23 09:11:30 np0005593103 podman[71828]: 2026-01-23 09:11:30.517337302 +0000 UTC m=+0.120205498 container exec_died 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, tcib_managed=true, url=https://www.redhat.com, version=17.1.12, description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.expose-services=, io.buildah.version=1.41.4, name=rhosp17/openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, architecture=x86_64, build-date=2025-11-18T22:49:49Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-memcached-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Jan 23 09:11:30 np0005593103 systemd[1]: 57670f61f7280c4d82717add18c894a882890b51a45f605e9ac40b71d6940c58.service: Deactivated successfully. Jan 23 09:11:31 np0005593103 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:7b:60:86 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.132 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=58317 DF PROTO=TCP SPT=48738 DPT=19885 SEQ=804295035 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080AF48C3C910000000001030307) Jan 23 09:11:31 np0005593103 systemd[1]: Started /usr/bin/podman healthcheck run 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e. Jan 23 09:11:31 np0005593103 podman[71850]: 2026-01-23 09:11:31.481065678 +0000 UTC m=+0.094552574 container health_status 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, io.buildah.version=1.41.4, build-date=2025-11-18T22:49:46Z, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, name=rhosp17/openstack-qdrouterd, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '972f55a7085b3a2f121c3e015c4b6025'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, vcs-type=git, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, config_id=tripleo_step1, vendor=Red Hat, Inc., container_name=metrics_qdr, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, managed_by=tripleo_ansible, tcib_managed=true, com.redhat.component=openstack-qdrouterd-container) Jan 23 09:11:31 np0005593103 podman[71850]: 2026-01-23 09:11:31.695489799 +0000 UTC m=+0.308976705 container exec_died 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, vendor=Red Hat, Inc., batch=17.1_20251118.1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-11-18T22:49:46Z, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '972f55a7085b3a2f121c3e015c4b6025'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.openshift.expose-services=, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, distribution-scope=public, container_name=metrics_qdr, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, release=1761123044) Jan 23 09:11:31 np0005593103 systemd[1]: 88b01ff5f75b4699b83757a703ea3d0a510d9cdb563885b0b1e0793ec4e6141e.service: Deactivated successfully. Jan 23 09:11:34 np0005593103 systemd-logind[36446]: Session 17 logged out. Waiting for processes to exit. Jan 23 09:11:34 np0005593103 systemd[1]: session-17.scope: Deactivated successfully. Jan 23 09:11:34 np0005593103 systemd-logind[36446]: Removed session 17. Jan 23 09:11:44 np0005593103 systemd[1]: Stopping User Manager for UID 1000... Jan 23 09:11:44 np0005593103 systemd[71794]: Activating special unit Exit the Session... Jan 23 09:11:44 np0005593103 systemd[71794]: Stopped target Main User Target. Jan 23 09:11:44 np0005593103 systemd[71794]: Stopped target Basic System. Jan 23 09:11:44 np0005593103 systemd[71794]: Stopped target Paths. Jan 23 09:11:44 np0005593103 systemd[71794]: Stopped target Sockets. Jan 23 09:11:44 np0005593103 systemd[71794]: Stopped target Timers. Jan 23 09:11:44 np0005593103 systemd[71794]: Stopped Mark boot as successful after the user session has run 2 minutes. Jan 23 09:11:44 np0005593103 systemd[71794]: Stopped Daily Cleanup of User's Temporary Directories. Jan 23 09:11:44 np0005593103 systemd[71794]: Closed D-Bus User Message Bus Socket. Jan 23 09:11:44 np0005593103 systemd[71794]: Stopped Create User's Volatile Files and Directories. Jan 23 09:11:44 np0005593103 systemd[71794]: Removed slice User Application Slice. Jan 23 09:11:44 np0005593103 systemd[71794]: Reached target Shutdown. Jan 23 09:11:44 np0005593103 systemd[71794]: Finished Exit the Session. Jan 23 09:11:44 np0005593103 systemd[71794]: Reached target Exit the Session. Jan 23 09:11:44 np0005593103 systemd[1]: user@1000.service: Deactivated successfully. Jan 23 09:11:44 np0005593103 systemd[1]: Stopped User Manager for UID 1000. Jan 23 09:11:46 np0005593103 sshd[71879]: main: sshd: ssh-rsa algorithm is disabled Jan 23 09:11:46 np0005593103 systemd[1]: Starting User Manager for UID 1000... Jan 23 09:11:46 np0005593103 systemd-logind[36446]: New session 19 of user zuul.